Compare commits
4 Commits
dmz
...
004990a4ca
| Author | SHA1 | Date | |
|---|---|---|---|
| 004990a4ca | |||
|
|
1481dbe107 | ||
| 0414919e05 | |||
| d5ab5c4671 |
1
.gitignore
vendored
1
.gitignore
vendored
@@ -1 +0,0 @@
|
|||||||
.idea
|
|
||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: dmz
|
targetRevision: prd
|
||||||
path: internalproxy
|
path: internalproxy
|
||||||
directory:
|
directory:
|
||||||
recurse: true
|
recurse: true
|
||||||
|
|||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: dmz
|
targetRevision: prd
|
||||||
path: argocd
|
path: argocd
|
||||||
destination:
|
destination:
|
||||||
namespace: argocd
|
namespace: argocd
|
||||||
|
|||||||
@@ -1,16 +1,16 @@
|
|||||||
apiVersion: argoproj.io/v1alpha1
|
apiVersion: argoproj.io/v1alpha1
|
||||||
kind: Application
|
kind: Application
|
||||||
metadata:
|
metadata:
|
||||||
name: metallb-system
|
name: authentik
|
||||||
namespace: argocd
|
namespace: argocd
|
||||||
spec:
|
spec:
|
||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: dmz
|
targetRevision: prd
|
||||||
path: metallb-system
|
path: authentik
|
||||||
destination:
|
destination:
|
||||||
namespace: metallb-system
|
namespace: authentik
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
syncPolicy:
|
syncPolicy:
|
||||||
automated:
|
automated:
|
||||||
@@ -19,4 +19,3 @@ spec:
|
|||||||
syncOptions:
|
syncOptions:
|
||||||
- CreateNamespace=true
|
- CreateNamespace=true
|
||||||
|
|
||||||
|
|
||||||
23
argocd/templates/bitwarden.yaml
Normal file
23
argocd/templates/bitwarden.yaml
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
kind: Application
|
||||||
|
metadata:
|
||||||
|
name: bitwarden
|
||||||
|
namespace: argocd
|
||||||
|
spec:
|
||||||
|
project: default
|
||||||
|
source:
|
||||||
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
|
targetRevision: prd
|
||||||
|
path: bitwarden
|
||||||
|
directory:
|
||||||
|
recurse: true
|
||||||
|
destination:
|
||||||
|
server: https://kubernetes.default.svc
|
||||||
|
namespace: bitwarden
|
||||||
|
syncPolicy:
|
||||||
|
automated:
|
||||||
|
prune: true
|
||||||
|
selfHeal: false
|
||||||
|
syncOptions:
|
||||||
|
- CreateNamespace=true
|
||||||
|
|
||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: dmz
|
targetRevision: prd
|
||||||
path: cert-manager
|
path: cert-manager
|
||||||
destination:
|
destination:
|
||||||
namespace: cert-manager
|
namespace: cert-manager
|
||||||
|
|||||||
20
argocd/templates/crossplane.yml
Normal file
20
argocd/templates/crossplane.yml
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
kind: Application
|
||||||
|
metadata:
|
||||||
|
name: crossplane
|
||||||
|
namespace: argocd
|
||||||
|
spec:
|
||||||
|
project: default
|
||||||
|
source:
|
||||||
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
|
targetRevision: prd
|
||||||
|
path: crossplane
|
||||||
|
destination:
|
||||||
|
namespace: crossplane
|
||||||
|
name: in-cluster
|
||||||
|
syncPolicy:
|
||||||
|
automated:
|
||||||
|
prune: true
|
||||||
|
selfHeal: true
|
||||||
|
syncOptions:
|
||||||
|
- CreateNamespace=true
|
||||||
20
argocd/templates/durpapi.yaml
Normal file
20
argocd/templates/durpapi.yaml
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
kind: Application
|
||||||
|
metadata:
|
||||||
|
name: durpapi
|
||||||
|
namespace: argocd
|
||||||
|
spec:
|
||||||
|
project: default
|
||||||
|
source:
|
||||||
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
|
targetRevision: prd
|
||||||
|
path: durpapi
|
||||||
|
destination:
|
||||||
|
namespace: durpapi
|
||||||
|
name: in-cluster
|
||||||
|
syncPolicy:
|
||||||
|
automated:
|
||||||
|
prune: true
|
||||||
|
selfHeal: true
|
||||||
|
syncOptions:
|
||||||
|
- CreateNamespace=true
|
||||||
20
argocd/templates/durpot.yaml
Normal file
20
argocd/templates/durpot.yaml
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
kind: Application
|
||||||
|
metadata:
|
||||||
|
name: durpot
|
||||||
|
namespace: argocd
|
||||||
|
spec:
|
||||||
|
project: default
|
||||||
|
source:
|
||||||
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
|
targetRevision: prd
|
||||||
|
path: durpot
|
||||||
|
destination:
|
||||||
|
namespace: durpot
|
||||||
|
name: in-cluster
|
||||||
|
syncPolicy:
|
||||||
|
automated:
|
||||||
|
prune: true
|
||||||
|
selfHeal: true
|
||||||
|
syncOptions:
|
||||||
|
- CreateNamespace=true
|
||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: dmz
|
targetRevision: prd
|
||||||
path: external-dns
|
path: external-dns
|
||||||
destination:
|
destination:
|
||||||
namespace: external-dns
|
namespace: external-dns
|
||||||
|
|||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: dmz
|
targetRevision: prd
|
||||||
path: external-secrets
|
path: external-secrets
|
||||||
destination:
|
destination:
|
||||||
namespace: external-secrets
|
namespace: external-secrets
|
||||||
|
|||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: dmz
|
targetRevision: prd
|
||||||
path: gatekeeper
|
path: gatekeeper
|
||||||
destination:
|
destination:
|
||||||
namespace: gatekeeper
|
namespace: gatekeeper
|
||||||
|
|||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: dmz
|
targetRevision: prd
|
||||||
path: gitlab-runner
|
path: gitlab-runner
|
||||||
destination:
|
destination:
|
||||||
namespace: gitlab-runner
|
namespace: gitlab-runner
|
||||||
|
|||||||
20
argocd/templates/heimdall.yaml
Normal file
20
argocd/templates/heimdall.yaml
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
kind: Application
|
||||||
|
metadata:
|
||||||
|
name: heimdall
|
||||||
|
namespace: argocd
|
||||||
|
spec:
|
||||||
|
project: default
|
||||||
|
source:
|
||||||
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
|
targetRevision: prd
|
||||||
|
path: heimdall
|
||||||
|
destination:
|
||||||
|
namespace: heimdall
|
||||||
|
name: in-cluster
|
||||||
|
syncPolicy:
|
||||||
|
automated:
|
||||||
|
prune: true
|
||||||
|
selfHeal: true
|
||||||
|
syncOptions:
|
||||||
|
- CreateNamespace=true
|
||||||
20
argocd/templates/krakend.yaml
Normal file
20
argocd/templates/krakend.yaml
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
kind: Application
|
||||||
|
metadata:
|
||||||
|
name: krakend
|
||||||
|
namespace: argocd
|
||||||
|
spec:
|
||||||
|
project: default
|
||||||
|
source:
|
||||||
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
|
targetRevision: prd
|
||||||
|
path: krakend
|
||||||
|
destination:
|
||||||
|
namespace: krakend
|
||||||
|
name: in-cluster
|
||||||
|
syncPolicy:
|
||||||
|
automated:
|
||||||
|
prune: true
|
||||||
|
selfHeal: true
|
||||||
|
syncOptions:
|
||||||
|
- CreateNamespace=true
|
||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: dmz
|
targetRevision: prd
|
||||||
path: kube-prometheus-stack
|
path: kube-prometheus-stack
|
||||||
destination:
|
destination:
|
||||||
namespace: kube-prometheus-stack
|
namespace: kube-prometheus-stack
|
||||||
|
|||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: dmz
|
targetRevision: prd
|
||||||
path: kubeclarity
|
path: kubeclarity
|
||||||
destination:
|
destination:
|
||||||
namespace: kubeclarity
|
namespace: kubeclarity
|
||||||
|
|||||||
22
argocd/templates/littlelink.yaml
Normal file
22
argocd/templates/littlelink.yaml
Normal file
@@ -0,0 +1,22 @@
|
|||||||
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
kind: Application
|
||||||
|
metadata:
|
||||||
|
name: littlelink
|
||||||
|
namespace: argocd
|
||||||
|
spec:
|
||||||
|
project: default
|
||||||
|
source:
|
||||||
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
|
targetRevision: prd
|
||||||
|
path: littlelink
|
||||||
|
directory:
|
||||||
|
recurse: true
|
||||||
|
destination:
|
||||||
|
server: https://kubernetes.default.svc
|
||||||
|
namespace: littlelink
|
||||||
|
syncPolicy:
|
||||||
|
automated:
|
||||||
|
prune: true
|
||||||
|
selfHeal: true
|
||||||
|
syncOptions:
|
||||||
|
- CreateNamespace=true
|
||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: dmz
|
targetRevision: prd
|
||||||
path: longhorn
|
path: longhorn
|
||||||
destination:
|
destination:
|
||||||
namespace: longhorn-system
|
namespace: longhorn-system
|
||||||
|
|||||||
23
argocd/templates/nfs-client.yaml
Normal file
23
argocd/templates/nfs-client.yaml
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
kind: Application
|
||||||
|
metadata:
|
||||||
|
name: nfs-client
|
||||||
|
namespace: argocd
|
||||||
|
spec:
|
||||||
|
project: default
|
||||||
|
source:
|
||||||
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
|
targetRevision: prd
|
||||||
|
path: nfs-client
|
||||||
|
directory:
|
||||||
|
recurse: true
|
||||||
|
destination:
|
||||||
|
namespace: nfs-client
|
||||||
|
name: in-cluster
|
||||||
|
syncPolicy:
|
||||||
|
automated:
|
||||||
|
prune: true
|
||||||
|
selfHeal: true
|
||||||
|
syncOptions:
|
||||||
|
- CreateNamespace=true
|
||||||
|
|
||||||
20
argocd/templates/open-webui.yaml
Normal file
20
argocd/templates/open-webui.yaml
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
kind: Application
|
||||||
|
metadata:
|
||||||
|
name: open-webui
|
||||||
|
namespace: argocd
|
||||||
|
spec:
|
||||||
|
project: default
|
||||||
|
source:
|
||||||
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
|
targetRevision: prd
|
||||||
|
path: open-webui
|
||||||
|
destination:
|
||||||
|
namespace: open-webui
|
||||||
|
name: in-cluster
|
||||||
|
syncPolicy:
|
||||||
|
automated:
|
||||||
|
prune: true
|
||||||
|
selfHeal: true
|
||||||
|
syncOptions:
|
||||||
|
- CreateNamespace=true
|
||||||
17
argocd/templates/secrets.yaml
Normal file
17
argocd/templates/secrets.yaml
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
apiVersion: external-secrets.io/v1beta1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: vault-argocd
|
||||||
|
labels:
|
||||||
|
app.kubernetes.io/part-of: argocd
|
||||||
|
spec:
|
||||||
|
secretStoreRef:
|
||||||
|
name: vault
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
target:
|
||||||
|
name: client-secret
|
||||||
|
data:
|
||||||
|
- secretKey: clientSecret
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/argocd/authentik
|
||||||
|
property: clientsecret
|
||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: dmz
|
targetRevision: prd
|
||||||
path: traefik
|
path: traefik
|
||||||
destination:
|
destination:
|
||||||
namespace: traefik
|
namespace: traefik
|
||||||
|
|||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: dmz
|
targetRevision: prd
|
||||||
path: uptimekuma
|
path: uptimekuma
|
||||||
directory:
|
directory:
|
||||||
recurse: true
|
recurse: true
|
||||||
|
|||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
project: default
|
project: default
|
||||||
source:
|
source:
|
||||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
targetRevision: dmz
|
targetRevision: prd
|
||||||
path: vault
|
path: vault
|
||||||
destination:
|
destination:
|
||||||
namespace: vault
|
namespace: vault
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
apiVersion: v2
|
apiVersion: v2
|
||||||
name: metallb-system
|
name: authentik
|
||||||
description: A Helm chart for Kubernetes
|
description: A Helm chart for Kubernetes
|
||||||
type: application
|
type: application
|
||||||
|
|
||||||
@@ -7,7 +7,6 @@ version: 0.1.0
|
|||||||
appVersion: "1.16.0"
|
appVersion: "1.16.0"
|
||||||
|
|
||||||
dependencies:
|
dependencies:
|
||||||
- name: metallb
|
- name: authentik
|
||||||
repository: https://metallb.github.io/metallb
|
repository: https://charts.goauthentik.io
|
||||||
version: 0.14.5
|
version: 2024.4.1
|
||||||
|
|
||||||
24
authentik/templates/authentik-pv.yaml
Normal file
24
authentik/templates/authentik-pv.yaml
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
#apiVersion: v1
|
||||||
|
#kind: PersistentVolume
|
||||||
|
#metadata:
|
||||||
|
# annotations:
|
||||||
|
# pv.kubernetes.io/provisioned-by: durp.info/nfs
|
||||||
|
# finalizers:
|
||||||
|
# - kubernetes.io/pv-protection
|
||||||
|
# name: authentik-pv
|
||||||
|
#spec:
|
||||||
|
# accessModes:
|
||||||
|
# - ReadWriteMany
|
||||||
|
# capacity:
|
||||||
|
# storage: 10Gi
|
||||||
|
# claimRef:
|
||||||
|
# apiVersion: v1
|
||||||
|
# kind: PersistentVolumeClaim
|
||||||
|
# name: authentik-pvc
|
||||||
|
# namespace: authentik
|
||||||
|
# nfs:
|
||||||
|
# path: /mnt/user/k3s/authentik
|
||||||
|
# server: 192.168.20.253
|
||||||
|
# persistentVolumeReclaimPolicy: Retain
|
||||||
|
# storageClassName: nfs-storage
|
||||||
|
# volumeMode: Filesystem
|
||||||
18
authentik/templates/authentik-pvc.yaml
Normal file
18
authentik/templates/authentik-pvc.yaml
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
#apiVersion: v1
|
||||||
|
#kind: PersistentVolumeClaim
|
||||||
|
#metadata:
|
||||||
|
# labels:
|
||||||
|
# app.kubernetes.io/component: app
|
||||||
|
# app.kubernetes.io/instance: authentik
|
||||||
|
# app.kubernetes.io/managed-by: Helm
|
||||||
|
# app.kubernetes.io/name: authentik
|
||||||
|
# helm.sh/chart: authentik-2.14.4
|
||||||
|
# name: authentik-pvc
|
||||||
|
# namespace: authentik
|
||||||
|
#spec:
|
||||||
|
# accessModes:
|
||||||
|
# - ReadWriteMany
|
||||||
|
# resources:
|
||||||
|
# requests:
|
||||||
|
# storage: 10Gi
|
||||||
|
# storageClassName: nfs-storage
|
||||||
42
authentik/templates/ingress.yaml
Normal file
42
authentik/templates/ingress.yaml
Normal file
@@ -0,0 +1,42 @@
|
|||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: authentik-ingress
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host(`authentik.durp.info`) && PathPrefix(`/`)
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: authentik-server
|
||||||
|
port: 80
|
||||||
|
tls:
|
||||||
|
secretName: authentik-tls
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: cert-manager.io/v1
|
||||||
|
kind: Certificate
|
||||||
|
metadata:
|
||||||
|
name: authentik-tls
|
||||||
|
spec:
|
||||||
|
secretName: authentik-tls
|
||||||
|
issuerRef:
|
||||||
|
name: letsencrypt-production
|
||||||
|
kind: ClusterIssuer
|
||||||
|
commonName: "authentik.durp.info"
|
||||||
|
dnsNames:
|
||||||
|
- "authentik.durp.info"
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
kind: Service
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: authentik-external-dns
|
||||||
|
annotations:
|
||||||
|
external-dns.alpha.kubernetes.io/hostname: authentik.durp.info
|
||||||
|
spec:
|
||||||
|
type: ExternalName
|
||||||
|
externalName: durp.info
|
||||||
28
authentik/templates/secrets.yaml
Normal file
28
authentik/templates/secrets.yaml
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
apiVersion: external-secrets.io/v1beta1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: authentik-secret
|
||||||
|
spec:
|
||||||
|
secretStoreRef:
|
||||||
|
name: vault
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
target:
|
||||||
|
name: db-pass
|
||||||
|
data:
|
||||||
|
- secretKey: dbpass
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/authentik/database
|
||||||
|
property: dbpass
|
||||||
|
- secretKey: secretkey
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/authentik/database
|
||||||
|
property: secretkey
|
||||||
|
- secretKey: postgresql-postgres-password
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/authentik/database
|
||||||
|
property: dbpass
|
||||||
|
- secretKey: postgresql-password
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/authentik/database
|
||||||
|
property: dbpass
|
||||||
|
|
||||||
53
authentik/values.yaml
Normal file
53
authentik/values.yaml
Normal file
@@ -0,0 +1,53 @@
|
|||||||
|
authentik:
|
||||||
|
global:
|
||||||
|
env:
|
||||||
|
- name: AUTHENTIK_REDIS__DB
|
||||||
|
value: "1"
|
||||||
|
- name: AUTHENTIK_POSTGRESQL__PASSWORD
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: db-pass
|
||||||
|
key: dbpass
|
||||||
|
- name: AUTHENTIK_SECRET_KEY
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: db-pass
|
||||||
|
key: secretkey
|
||||||
|
revisionHistoryLimit: 1
|
||||||
|
image:
|
||||||
|
repository: registry.internal.durp.info/goauthentik/server
|
||||||
|
pullPolicy: Always
|
||||||
|
authentik:
|
||||||
|
outposts:
|
||||||
|
container_image_base: registry.internal.durp.info/goauthentik/%(type)s:%(version)s
|
||||||
|
postgresql:
|
||||||
|
host: '{{ .Release.Name }}-postgresql-hl'
|
||||||
|
name: "authentik"
|
||||||
|
user: "authentik"
|
||||||
|
port: 5432
|
||||||
|
server:
|
||||||
|
name: server
|
||||||
|
replicas: 3
|
||||||
|
postgresql:
|
||||||
|
enabled: true
|
||||||
|
image:
|
||||||
|
registry: registry.internal.durp.info
|
||||||
|
repository: bitnami/postgresql
|
||||||
|
pullPolicy: Always
|
||||||
|
postgresqlUsername: "authentik"
|
||||||
|
postgresqlDatabase: "authentik"
|
||||||
|
existingSecret: db-pass
|
||||||
|
persistence:
|
||||||
|
enabled: true
|
||||||
|
storageClass: longhorn
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteMany
|
||||||
|
redis:
|
||||||
|
enabled: true
|
||||||
|
image:
|
||||||
|
registry: registry.internal.durp.info
|
||||||
|
repository: bitnami/redis
|
||||||
|
pullPolicy: Always
|
||||||
|
architecture: standalone
|
||||||
|
auth:
|
||||||
|
enabled: false
|
||||||
7
bitwarden/Chart.yaml
Normal file
7
bitwarden/Chart.yaml
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
apiVersion: v2
|
||||||
|
name: bitwarden
|
||||||
|
description: A Helm chart for Kubernetes
|
||||||
|
type: application
|
||||||
|
|
||||||
|
version: 0.1.0
|
||||||
|
appVersion: "1.16.0"
|
||||||
25
bitwarden/templates/bitwarden-pv.yaml
Normal file
25
bitwarden/templates/bitwarden-pv.yaml
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
#apiVersion: v1
|
||||||
|
#kind: PersistentVolume
|
||||||
|
#metadata:
|
||||||
|
# annotations:
|
||||||
|
# pv.kubernetes.io/provisioned-by: durp.info/nfs
|
||||||
|
# finalizers:
|
||||||
|
# - kubernetes.io/pv-protection
|
||||||
|
# name: bitwarden-pv
|
||||||
|
#spec:
|
||||||
|
# accessModes:
|
||||||
|
# - ReadWriteMany
|
||||||
|
# capacity:
|
||||||
|
# storage: 10Gi
|
||||||
|
# claimRef:
|
||||||
|
# apiVersion: v1
|
||||||
|
# kind: PersistentVolumeClaim
|
||||||
|
# name: bitwarden-pvc
|
||||||
|
# namespace: bitwarden
|
||||||
|
# nfs:
|
||||||
|
# path: /mnt/user/k3s/bitwarden
|
||||||
|
# server: 192.168.20.253
|
||||||
|
# persistentVolumeReclaimPolicy: Retain
|
||||||
|
# storageClassName: nfs-storage
|
||||||
|
# volumeMode: Filesystem
|
||||||
|
#
|
||||||
11
bitwarden/templates/bitwarden-pvc.yaml
Normal file
11
bitwarden/templates/bitwarden-pvc.yaml
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: PersistentVolumeClaim
|
||||||
|
metadata:
|
||||||
|
name: bitwarden-pvc
|
||||||
|
spec:
|
||||||
|
storageClassName: longhorn
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteMany
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: 10Gi
|
||||||
50
bitwarden/templates/deployment.yaml
Normal file
50
bitwarden/templates/deployment.yaml
Normal file
@@ -0,0 +1,50 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
namespace: bitwarden
|
||||||
|
name: bitwarden
|
||||||
|
labels:
|
||||||
|
app: bitwarden
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: bitwarden
|
||||||
|
replicas: 1
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: bitwarden
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: bitwarden
|
||||||
|
image: registry.internal.durp.info/vaultwarden/server:1.30.3
|
||||||
|
imagePullPolicy: Always
|
||||||
|
volumeMounts:
|
||||||
|
- name: bitwarden-pvc
|
||||||
|
mountPath: /data
|
||||||
|
subPath: bitwaren-data
|
||||||
|
ports:
|
||||||
|
- name: http
|
||||||
|
containerPort: 80
|
||||||
|
env:
|
||||||
|
- name: SIGNUPS_ALLOWED
|
||||||
|
value: "FALSE"
|
||||||
|
- name: INVITATIONS_ALLOWED
|
||||||
|
value: "FALSE"
|
||||||
|
- name: WEBSOCKET_ENABLED
|
||||||
|
value: "TRUE"
|
||||||
|
- name: ROCKET_ENV
|
||||||
|
value: "staging"
|
||||||
|
- name: ROCKET_PORT
|
||||||
|
value: "80"
|
||||||
|
- name: ROCKET_WORKERS
|
||||||
|
value: "10"
|
||||||
|
- name: SECRET_USERNAME
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: bitwarden-secret
|
||||||
|
key: ADMIN_TOKEN
|
||||||
|
volumes:
|
||||||
|
- name: bitwarden-pvc
|
||||||
|
persistentVolumeClaim:
|
||||||
|
claimName: bitwarden-pvc
|
||||||
42
bitwarden/templates/ingress.yaml
Normal file
42
bitwarden/templates/ingress.yaml
Normal file
@@ -0,0 +1,42 @@
|
|||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: bitwarden-ingress
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host(`bitwarden.durp.info`) && PathPrefix(`/`)
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: bitwarden
|
||||||
|
port: 80
|
||||||
|
tls:
|
||||||
|
secretName: bitwarden-tls
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: cert-manager.io/v1
|
||||||
|
kind: Certificate
|
||||||
|
metadata:
|
||||||
|
name: bitwarden-tls
|
||||||
|
spec:
|
||||||
|
secretName: bitwarden-tls
|
||||||
|
issuerRef:
|
||||||
|
name: letsencrypt-production
|
||||||
|
kind: ClusterIssuer
|
||||||
|
commonName: "bitwarden.durp.info"
|
||||||
|
dnsNames:
|
||||||
|
- "bitwarden.durp.info"
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
kind: Service
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: bitwarden-external-dns
|
||||||
|
annotations:
|
||||||
|
external-dns.alpha.kubernetes.io/hostname: bitwarden.durp.info
|
||||||
|
spec:
|
||||||
|
type: ExternalName
|
||||||
|
externalName: durp.info
|
||||||
16
bitwarden/templates/secrets.yaml
Normal file
16
bitwarden/templates/secrets.yaml
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
apiVersion: external-secrets.io/v1beta1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: bitwarden-secret
|
||||||
|
spec:
|
||||||
|
secretStoreRef:
|
||||||
|
name: vault
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
target:
|
||||||
|
name: bitwarden-secret
|
||||||
|
data:
|
||||||
|
- secretKey: ADMIN_TOKEN
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/bitwarden/admin
|
||||||
|
property: ADMIN_TOKEN
|
||||||
|
|
||||||
12
bitwarden/templates/service.yaml
Normal file
12
bitwarden/templates/service.yaml
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: bitwarden
|
||||||
|
spec:
|
||||||
|
ports:
|
||||||
|
- name: http
|
||||||
|
port: 80
|
||||||
|
targetPort: 80
|
||||||
|
protocol: TCP
|
||||||
|
selector:
|
||||||
|
app: bitwarden
|
||||||
12
crossplane/Chart.yaml
Normal file
12
crossplane/Chart.yaml
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: v2
|
||||||
|
name: crossplane
|
||||||
|
description: A Helm chart for Kubernetes
|
||||||
|
type: application
|
||||||
|
|
||||||
|
version: 0.1.0
|
||||||
|
appVersion: "1.16.0"
|
||||||
|
|
||||||
|
dependencies:
|
||||||
|
- name: crossplane
|
||||||
|
repository: https://charts.crossplane.io/stable
|
||||||
|
version: 1.12.0
|
||||||
55
crossplane/templates/gitlab.yml
Normal file
55
crossplane/templates/gitlab.yml
Normal file
@@ -0,0 +1,55 @@
|
|||||||
|
apiVersion: pkg.crossplane.io/v1
|
||||||
|
kind: Provider
|
||||||
|
metadata:
|
||||||
|
name: provider-gitlab
|
||||||
|
spec:
|
||||||
|
package: xpkg.upbound.io/crossplane-contrib/provider-gitlab:v0.5.0
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: external-secrets.io/v1beta1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: gitlab-secret
|
||||||
|
spec:
|
||||||
|
secretStoreRef:
|
||||||
|
name: vault
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
target:
|
||||||
|
name: gitlab-secret
|
||||||
|
data:
|
||||||
|
- secretKey: accesstoken
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/gitlab/token
|
||||||
|
property: accesstoken
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
#apiVersion: gitlab.crossplane.io/v1beta1
|
||||||
|
#kind: ProviderConfig
|
||||||
|
#metadata:
|
||||||
|
# name: gitlab-provider
|
||||||
|
#spec:
|
||||||
|
# baseURL: https://gitlab.com/
|
||||||
|
# credentials:
|
||||||
|
# source: Secret
|
||||||
|
# secretRef:
|
||||||
|
# namespace: crossplane
|
||||||
|
# name: gitlab-secret
|
||||||
|
# key: accesstoken
|
||||||
|
#
|
||||||
|
#---
|
||||||
|
#
|
||||||
|
#apiVersion: projects.gitlab.crossplane.io/v1alpha1
|
||||||
|
#kind: Project
|
||||||
|
#metadata:
|
||||||
|
# name: example-project
|
||||||
|
#spec:
|
||||||
|
# deletionPolicy: Orphan
|
||||||
|
# forProvider:
|
||||||
|
# name: "Example Project"
|
||||||
|
# description: "example project description"
|
||||||
|
# providerConfigRef:
|
||||||
|
# name: gitlab-provider
|
||||||
|
# policy:
|
||||||
|
# resolution: Optional
|
||||||
|
# resolve: Always
|
||||||
1506
dashboards/nginx-dashboard.yaml
Normal file
1506
dashboards/nginx-dashboard.yaml
Normal file
File diff suppressed because it is too large
Load Diff
11
durpapi/Chart.yaml
Normal file
11
durpapi/Chart.yaml
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
name: durpapi
|
||||||
|
version: 0.1.0-dev0180
|
||||||
|
dependencies:
|
||||||
|
- condition: postgresql.enabled
|
||||||
|
name: postgresql
|
||||||
|
version: 12.5.*
|
||||||
|
repository: https://charts.bitnami.com/bitnami
|
||||||
|
type: application
|
||||||
|
appVersion: 0.1.0
|
||||||
|
apiVersion: v2
|
||||||
|
description: A Helm chart for Kubernetes
|
||||||
38
durpapi/templates/deployment.yaml
Normal file
38
durpapi/templates/deployment.yaml
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: {{ .Chart.Name }}
|
||||||
|
labels:
|
||||||
|
app: {{ .Chart.Name }}
|
||||||
|
spec:
|
||||||
|
revisionHistoryLimit: 1
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: {{ .Chart.Name }}
|
||||||
|
replicas: {{ .Values.deployment.hpa.minReplicas }}
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: {{ .Chart.Name }}
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: api
|
||||||
|
image: "{{ .Values.deployment.image }}:{{ default .Chart.Version .Values.deployment.tag }}"
|
||||||
|
imagePullPolicy: {{ .Values.deployment.imagePullPolicy }}
|
||||||
|
readinessProbe:
|
||||||
|
{{- toYaml .Values.deployment.probe.readiness | nindent 12 }}
|
||||||
|
livenessProbe:
|
||||||
|
{{- toYaml .Values.deployment.probe.liveness | nindent 12 }}
|
||||||
|
startupProbe:
|
||||||
|
{{- toYaml .Values.deployment.probe.startup | nindent 12 }}
|
||||||
|
ports:
|
||||||
|
- name: http
|
||||||
|
containerPort: {{ .Values.service.targetport }}
|
||||||
|
env:
|
||||||
|
- name: host
|
||||||
|
value: {{ .Values.swagger.host }}
|
||||||
|
- name: version
|
||||||
|
value: {{ default .Chart.Version .Values.deployment.tag }}
|
||||||
|
envFrom:
|
||||||
|
- secretRef:
|
||||||
|
name: {{ .Values.deployment.secretfile }}
|
||||||
24
durpapi/templates/hpa.yaml
Normal file
24
durpapi/templates/hpa.yaml
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
apiVersion: autoscaling/v2
|
||||||
|
kind: HorizontalPodAutoscaler
|
||||||
|
metadata:
|
||||||
|
name: "{{ .Chart.Name }}-hpa"
|
||||||
|
spec:
|
||||||
|
scaleTargetRef:
|
||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
name: {{ .Chart.Name }}
|
||||||
|
minReplicas: {{ .Values.deployment.hpa.minReplicas }}
|
||||||
|
maxReplicas: {{ .Values.deployment.hpa.maxReplicas }}
|
||||||
|
metrics:
|
||||||
|
- type: Resource
|
||||||
|
resource:
|
||||||
|
name: memory
|
||||||
|
target:
|
||||||
|
type: Utilization
|
||||||
|
averageUtilization: 80
|
||||||
|
- type: Resource
|
||||||
|
resource:
|
||||||
|
name: cpu
|
||||||
|
target:
|
||||||
|
type: Utilization
|
||||||
|
averageUtilization: 40
|
||||||
44
durpapi/templates/ingress.yaml
Normal file
44
durpapi/templates/ingress.yaml
Normal file
@@ -0,0 +1,44 @@
|
|||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: "{{ .Chart.Name }}-ingress"
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host("api.durp.info") && PathPrefix(`/api`)
|
||||||
|
kind: Rule
|
||||||
|
middlewares:
|
||||||
|
- name: jwt
|
||||||
|
services:
|
||||||
|
- name: "durpapi-service"
|
||||||
|
port: 80
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: "{{ .Chart.Name }}-swagger"
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host("api.durp.info") && PathPrefix(`/swagger`)
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: "durpapi-service"
|
||||||
|
port: 80
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: Middleware
|
||||||
|
metadata:
|
||||||
|
name: jwt
|
||||||
|
spec:
|
||||||
|
plugin:
|
||||||
|
jwt:
|
||||||
|
Required: true
|
||||||
|
Keys:
|
||||||
|
- https://authentik.durp.info/application/o/api/jwks/
|
||||||
39
durpapi/templates/secrets.yaml
Normal file
39
durpapi/templates/secrets.yaml
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
apiVersion: external-secrets.io/v1beta1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: durpapi-secret
|
||||||
|
spec:
|
||||||
|
secretStoreRef:
|
||||||
|
name: vault
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
target:
|
||||||
|
name: durpapi-secret
|
||||||
|
data:
|
||||||
|
- secretKey: db_host
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/durpapi/postgres
|
||||||
|
property: db_host
|
||||||
|
- secretKey: db_port
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/durpapi/postgres
|
||||||
|
property: db_port
|
||||||
|
- secretKey: db_pass
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/durpapi/postgres
|
||||||
|
property: db_pass
|
||||||
|
- secretKey: db_user
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/durpapi/postgres
|
||||||
|
property: db_user
|
||||||
|
- secretKey: db_sslmode
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/durpapi/postgres
|
||||||
|
property: db_sslmode
|
||||||
|
- secretKey: db_name
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/durpapi/postgres
|
||||||
|
property: db_name
|
||||||
|
- secretKey: llamaurl
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/durpapi/llamaurl
|
||||||
|
property: llamaurl
|
||||||
12
durpapi/templates/service.yaml
Normal file
12
durpapi/templates/service.yaml
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: "{{ .Chart.Name }}-service"
|
||||||
|
spec:
|
||||||
|
ports:
|
||||||
|
- name: http
|
||||||
|
port: {{ .Values.service.port }}
|
||||||
|
targetPort: {{ .Values.service.targetport }}
|
||||||
|
protocol: TCP
|
||||||
|
selector:
|
||||||
|
app: {{ .Chart.Name }}
|
||||||
39
durpapi/values.yaml
Normal file
39
durpapi/values.yaml
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
ingress:
|
||||||
|
enabled: false
|
||||||
|
deployment:
|
||||||
|
image: registry.internal.durp.info/developerdurp/durpapi
|
||||||
|
secretfile: durpapi-secret
|
||||||
|
imagePullPolicy: Always
|
||||||
|
hpa:
|
||||||
|
minReplicas: 3
|
||||||
|
maxReplicas: 10
|
||||||
|
probe:
|
||||||
|
readiness:
|
||||||
|
httpGet:
|
||||||
|
path: /api/health/gethealth
|
||||||
|
port: 8080
|
||||||
|
liveness:
|
||||||
|
httpGet:
|
||||||
|
path: /api/health/gethealth
|
||||||
|
port: 8080
|
||||||
|
startup:
|
||||||
|
httpGet:
|
||||||
|
path: /api/health/gethealth
|
||||||
|
port: 8080
|
||||||
|
service:
|
||||||
|
type: ClusterIP
|
||||||
|
port: 80
|
||||||
|
targetport: 8080
|
||||||
|
|
||||||
|
swagger:
|
||||||
|
host: api.durp.info
|
||||||
|
postgresql:
|
||||||
|
enabled: true
|
||||||
|
auth:
|
||||||
|
existingSecret: durpapi-secret
|
||||||
|
secretKeys:
|
||||||
|
adminPasswordKey: db_pass
|
||||||
|
userPasswordKey: db_pass
|
||||||
|
replicationPasswordKey: db_pass
|
||||||
|
database: postgres
|
||||||
|
username: postgres
|
||||||
11
durpot/Chart.yaml
Normal file
11
durpot/Chart.yaml
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
apiVersion: v2
|
||||||
|
name: durpapi
|
||||||
|
description: A Helm chart for Kubernetes
|
||||||
|
type: application
|
||||||
|
version: 0.0.1
|
||||||
|
appVersion: 0.0.1
|
||||||
|
|
||||||
|
dependencies:
|
||||||
|
- name: durpot
|
||||||
|
repository: https://gitlab.com/api/v4/projects/45025485/packages/helm/stable
|
||||||
|
version: 0.1.0-dev0038
|
||||||
43
durpot/templates/secrets.yaml
Normal file
43
durpot/templates/secrets.yaml
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
apiVersion: external-secrets.io/v1beta1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: durpot-secert
|
||||||
|
spec:
|
||||||
|
secretStoreRef:
|
||||||
|
name: vault
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
target:
|
||||||
|
name: durpot-secret
|
||||||
|
data:
|
||||||
|
- secretKey: OPENAI_API_KEY
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/durpot/openai
|
||||||
|
property: OPENAI_API_KEY
|
||||||
|
- secretKey: BOTPREFIX
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/durpot/discord
|
||||||
|
property: BOTPREFIX
|
||||||
|
- secretKey: ChannelID
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/durpot/discord
|
||||||
|
property: ChannelID
|
||||||
|
- secretKey: TOKEN
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/durpot/discord
|
||||||
|
property: TOKEN
|
||||||
|
- secretKey: ClientID
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/durpot/auth
|
||||||
|
property: ClientID
|
||||||
|
- secretKey: Password
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/durpot/auth
|
||||||
|
property: Password
|
||||||
|
- secretKey: TokenURL
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/durpot/auth
|
||||||
|
property: TokenURL
|
||||||
|
- secretKey: Username
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/durpot/auth
|
||||||
|
property: Username
|
||||||
@@ -4,13 +4,13 @@ external-dns:
|
|||||||
|
|
||||||
image:
|
image:
|
||||||
pullPolicy: Always
|
pullPolicy: Always
|
||||||
txtPrefix: "dmz-"
|
|
||||||
sources:
|
sources:
|
||||||
- service
|
- service
|
||||||
|
|
||||||
provider: cloudflare
|
provider: cloudflare
|
||||||
cloudflare:
|
cloudflare:
|
||||||
secretName : "external-dns"
|
secretName : "external-dns"
|
||||||
proxied: false
|
proxied: true
|
||||||
|
|
||||||
policy: sync
|
policy: sync
|
||||||
@@ -1,33 +0,0 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
metadata:
|
|
||||||
name: vault
|
|
||||||
spec:
|
|
||||||
provider:
|
|
||||||
vault:
|
|
||||||
server: "https://vault.internal.prd.durp.info"
|
|
||||||
path: "secrets"
|
|
||||||
version: "v2"
|
|
||||||
auth:
|
|
||||||
kubernetes:
|
|
||||||
mountPath: "kubernetes"
|
|
||||||
role: "dmz-external-secrets"
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
apiVersion: external-secrets.io/v1beta1
|
|
||||||
kind: ExternalSecret
|
|
||||||
metadata:
|
|
||||||
name: cloudflare-api-token-secret
|
|
||||||
spec:
|
|
||||||
secretStoreRef:
|
|
||||||
name: vault
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
target:
|
|
||||||
name: cloudflare-api-token-secret
|
|
||||||
data:
|
|
||||||
- secretKey: cloudflare-api-token-secret
|
|
||||||
remoteRef:
|
|
||||||
key: secrets/cert-manager
|
|
||||||
property: cloudflare-api-token-secret
|
|
||||||
|
|
||||||
11
heimdall/Chart.yaml
Normal file
11
heimdall/Chart.yaml
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
apiVersion: v2
|
||||||
|
name: heimdall
|
||||||
|
description: A Helm chart for Kubernetes
|
||||||
|
type: application
|
||||||
|
version: 0.0.1
|
||||||
|
appVersion: 0.0.1
|
||||||
|
|
||||||
|
dependencies:
|
||||||
|
- name: heimdall
|
||||||
|
repository: https://djjudas21.github.io/charts/
|
||||||
|
version: 8.5.2
|
||||||
52
heimdall/templates/ingress.yaml
Normal file
52
heimdall/templates/ingress.yaml
Normal file
@@ -0,0 +1,52 @@
|
|||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
name: heimdall-ingress
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host(`heimdall.durp.info`) && PathPrefix(`/`)
|
||||||
|
middlewares:
|
||||||
|
- name: authentik-proxy-provider
|
||||||
|
namespace: traefik
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: heimdall
|
||||||
|
port: 80
|
||||||
|
- match: Host(`heimdall.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: ak-outpost-authentik-embedded-outpost
|
||||||
|
namespace: authentik
|
||||||
|
port: 9000
|
||||||
|
tls:
|
||||||
|
secretName: heimdall-tls
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: cert-manager.io/v1
|
||||||
|
kind: Certificate
|
||||||
|
metadata:
|
||||||
|
name: heimdall-tls
|
||||||
|
spec:
|
||||||
|
secretName: heimdall-tls
|
||||||
|
issuerRef:
|
||||||
|
name: letsencrypt-production
|
||||||
|
kind: ClusterIssuer
|
||||||
|
commonName: "heimdall.durp.info"
|
||||||
|
dnsNames:
|
||||||
|
- "heimdall.durp.info"
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
kind: Service
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: heimdall-external-dns
|
||||||
|
annotations:
|
||||||
|
external-dns.alpha.kubernetes.io/hostname: heimdall.durp.info
|
||||||
|
spec:
|
||||||
|
type: ExternalName
|
||||||
|
externalName: durp.info
|
||||||
28
heimdall/values.yaml
Normal file
28
heimdall/values.yaml
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
heimdall:
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry:
|
||||||
|
repository: registry.internal.durp.info/linuxserver/heimdall
|
||||||
|
pullPolicy: Always
|
||||||
|
|
||||||
|
env:
|
||||||
|
TZ: UTC
|
||||||
|
PUID: "1000"
|
||||||
|
PGID: "1000"
|
||||||
|
|
||||||
|
service:
|
||||||
|
main:
|
||||||
|
annotations:
|
||||||
|
external-dns.alpha.kubernetes.io/hostname: heimdall.durp.info
|
||||||
|
external-dns.alpha.kubernetes.io/target: home.durp.info
|
||||||
|
ports:
|
||||||
|
http:
|
||||||
|
port: 80
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
main:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
persistence:
|
||||||
|
config:
|
||||||
|
enabled: true
|
||||||
7
krakend/Chart.yaml
Normal file
7
krakend/Chart.yaml
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
apiVersion: v2
|
||||||
|
name: krakend
|
||||||
|
description: A Helm chart for Kubernetes
|
||||||
|
type: application
|
||||||
|
|
||||||
|
version: 0.1.0
|
||||||
|
appVersion: "1.16.0"
|
||||||
39
krakend/templates/deployments.yaml
Normal file
39
krakend/templates/deployments.yaml
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
namespace: krakend
|
||||||
|
name: krakend
|
||||||
|
labels:
|
||||||
|
app: krakend
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: krakend
|
||||||
|
replicas: 1
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: krakend
|
||||||
|
spec:
|
||||||
|
volumes:
|
||||||
|
- name: krakend-secret
|
||||||
|
secret:
|
||||||
|
secretName: krakend-secret
|
||||||
|
containers:
|
||||||
|
- name: krakend
|
||||||
|
image: registry.internal.durp.info/devopsfaith/krakend:2.4.3
|
||||||
|
imagePullPolicy: Always
|
||||||
|
livenessProbe:
|
||||||
|
httpGet:
|
||||||
|
path: /__health
|
||||||
|
port: 8080
|
||||||
|
readinessProbe:
|
||||||
|
httpGet:
|
||||||
|
path: /__health
|
||||||
|
port: 8080
|
||||||
|
ports:
|
||||||
|
- name: http
|
||||||
|
containerPort: 8080
|
||||||
|
volumeMounts:
|
||||||
|
- name: krakend-secret
|
||||||
|
mountPath: /etc/krakend
|
||||||
56
krakend/templates/ingress.yaml
Normal file
56
krakend/templates/ingress.yaml
Normal file
@@ -0,0 +1,56 @@
|
|||||||
|
apiVersion: cert-manager.io/v1
|
||||||
|
kind: Certificate
|
||||||
|
metadata:
|
||||||
|
name: api-tls
|
||||||
|
spec:
|
||||||
|
secretName: api-tls
|
||||||
|
issuerRef:
|
||||||
|
name: letsencrypt-production
|
||||||
|
kind: ClusterIssuer
|
||||||
|
commonName: "api.durp.info"
|
||||||
|
dnsNames:
|
||||||
|
- "api.durp.info"
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: krakend-ingress
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host(`api.durp.info`) && PathPrefix(`/`)
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: krakend-service
|
||||||
|
port: 8080
|
||||||
|
scheme: http
|
||||||
|
tls:
|
||||||
|
secretName: api-tls
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
kind: Service
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: api-external-dns
|
||||||
|
annotations:
|
||||||
|
external-dns.alpha.kubernetes.io/hostname: api.durp.info
|
||||||
|
spec:
|
||||||
|
type: ExternalName
|
||||||
|
externalName: durp.info
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
kind: Service
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: api-developer-dns
|
||||||
|
annotations:
|
||||||
|
external-dns.alpha.kubernetes.io/hostname: developer.durp.info
|
||||||
|
external-dns.alpha.kubernetes.io/cloudflare-proxied: "false"
|
||||||
|
spec:
|
||||||
|
type: ExternalName
|
||||||
|
externalName: developerdurp.github.io
|
||||||
15
krakend/templates/secrets.yaml
Normal file
15
krakend/templates/secrets.yaml
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
apiVersion: external-secrets.io/v1beta1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: krakend-secret
|
||||||
|
spec:
|
||||||
|
secretStoreRef:
|
||||||
|
name: vault
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
target:
|
||||||
|
name: krakend-secret
|
||||||
|
data:
|
||||||
|
- secretKey: krakend.json
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/krakend/config
|
||||||
|
property: config
|
||||||
12
krakend/templates/service.yaml
Normal file
12
krakend/templates/service.yaml
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: krakend-service
|
||||||
|
spec:
|
||||||
|
ports:
|
||||||
|
- name: http
|
||||||
|
port: 8080
|
||||||
|
targetPort: 8080
|
||||||
|
protocol: TCP
|
||||||
|
selector:
|
||||||
|
app: krakend
|
||||||
0
littlelink/Chart.yaml
Normal file
0
littlelink/Chart.yaml
Normal file
99
littlelink/templates/deployment.yaml
Normal file
99
littlelink/templates/deployment.yaml
Normal file
@@ -0,0 +1,99 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
namespace: littlelink
|
||||||
|
name: littlelink
|
||||||
|
labels:
|
||||||
|
app: littlelink
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: littlelink
|
||||||
|
replicas: 1
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: littlelink
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: littlelink
|
||||||
|
image: registry.internal.durp.info/techno-tim/littlelink-server:latest
|
||||||
|
imagePullPolicy: Always
|
||||||
|
livenessProbe:
|
||||||
|
httpGet:
|
||||||
|
path: /healthcheck
|
||||||
|
port: 3000
|
||||||
|
readinessProbe:
|
||||||
|
httpGet:
|
||||||
|
path: /healthcheck
|
||||||
|
port: 3000
|
||||||
|
env:
|
||||||
|
- name: META_TITLE
|
||||||
|
value: DeveloperDurp
|
||||||
|
- name: META_DESCRIPTION
|
||||||
|
value: The Durpy Developer
|
||||||
|
- name: META_AUTHOR
|
||||||
|
value: DeveloperDurp
|
||||||
|
- name: LANG
|
||||||
|
value: en
|
||||||
|
- name: META_INDEX_STATUS
|
||||||
|
value: all
|
||||||
|
- name: OG_TITLE
|
||||||
|
value: DeveloperDurp
|
||||||
|
- name: OG_DESCRIPTION
|
||||||
|
value: DeveloperDurp
|
||||||
|
- name: OG_URL
|
||||||
|
value: https://gitlab.com/developerdurp
|
||||||
|
- name: OG_IMAGE
|
||||||
|
value: https://gitlab.com/uploads/-/system/user/avatar/9987937/avatar.png
|
||||||
|
- name : OG_IMAGE_WIDTH
|
||||||
|
value: "400"
|
||||||
|
- name : OG_IMAGE_HEIGHT
|
||||||
|
value: "400"
|
||||||
|
- name : THEME
|
||||||
|
value: Dark
|
||||||
|
- name : FAVICON_URL
|
||||||
|
value: https://gitlab.com/uploads/-/system/user/avatar/9987937/avatar.png
|
||||||
|
- name : AVATAR_URL
|
||||||
|
value: https://gitlab.com/uploads/-/system/user/avatar/9987937/avatar.png
|
||||||
|
- name : AVATAR_2X_URL
|
||||||
|
value: https://gitlab.com/uploads/-/system/user/avatar/9987937/avatar.png
|
||||||
|
- name : AVATAR_ALT
|
||||||
|
value: DeveloperDurp Profile Pic
|
||||||
|
- name : NAME
|
||||||
|
value: DeveloperDurp
|
||||||
|
- name : BIO
|
||||||
|
value: Sup Nerd,
|
||||||
|
- name : BUTTON_ORDER
|
||||||
|
value: GITHUB,GITLAB,YOUTUBE,TWITTER,COFFEE,EMAIL
|
||||||
|
- name : TWITTER
|
||||||
|
value: https://twitter.com/developerdurp
|
||||||
|
- name : GITHUB
|
||||||
|
value: https://github.com/DeveloperDurp
|
||||||
|
- name : GITLAB
|
||||||
|
value: https://gitlab.com/developerdurp
|
||||||
|
- name: YOUTUBE
|
||||||
|
value: https://www.youtube.com/channel/UC1rGa6s6kER_gLpIQsxeMVQ
|
||||||
|
- name : EMAIL
|
||||||
|
value: DeveloperDurp@durp.info
|
||||||
|
- name : EMAIL_TEXT
|
||||||
|
value: DeveloperDurp@durp.info
|
||||||
|
- name : FOOTER
|
||||||
|
value: DeveloperDurp © 2022
|
||||||
|
- name: CUSTOM_BUTTON_TEXT
|
||||||
|
value: BuyMeACoffee
|
||||||
|
- name: CUSTOM_BUTTON_URL
|
||||||
|
value: https://www.buymeacoffee.com/DeveloperDurp
|
||||||
|
- name: CUSTOM_BUTTON_COLOR
|
||||||
|
value: '#ffdd00'
|
||||||
|
- name: CUSTOM_BUTTON_TEXT_COLOR
|
||||||
|
value: '#000000'
|
||||||
|
- name: CUSTOM_BUTTON_ALT_TEXT
|
||||||
|
value: Support
|
||||||
|
- name: CUSTOM_BUTTON_NAME
|
||||||
|
value: COFFEE
|
||||||
|
- name: CUSTOM_BUTTON_ICON
|
||||||
|
value: fa-solid fa-cup-togo
|
||||||
|
ports:
|
||||||
|
- name: http
|
||||||
|
containerPort: 3000
|
||||||
42
littlelink/templates/ingress.yaml
Normal file
42
littlelink/templates/ingress.yaml
Normal file
@@ -0,0 +1,42 @@
|
|||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: littlelink-ingress
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host(`links.durp.info`) && PathPrefix(`/`)
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: littlelink
|
||||||
|
port: 80
|
||||||
|
tls:
|
||||||
|
secretName: littlelink-tls
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: cert-manager.io/v1
|
||||||
|
kind: Certificate
|
||||||
|
metadata:
|
||||||
|
name: littlelink-tls
|
||||||
|
spec:
|
||||||
|
secretName: littlelink-tls
|
||||||
|
issuerRef:
|
||||||
|
name: letsencrypt-production
|
||||||
|
kind: ClusterIssuer
|
||||||
|
commonName: "links.durp.info"
|
||||||
|
dnsNames:
|
||||||
|
- "links.durp.info"
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
kind: Service
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: links-external-dns
|
||||||
|
annotations:
|
||||||
|
external-dns.alpha.kubernetes.io/hostname: links.durp.info
|
||||||
|
spec:
|
||||||
|
type: ExternalName
|
||||||
|
externalName: durp.info
|
||||||
12
littlelink/templates/service.yaml
Normal file
12
littlelink/templates/service.yaml
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: littlelink
|
||||||
|
spec:
|
||||||
|
ports:
|
||||||
|
- name: http
|
||||||
|
port: 80
|
||||||
|
targetPort: 3000
|
||||||
|
protocol: TCP
|
||||||
|
selector:
|
||||||
|
app: littlelink
|
||||||
@@ -1,17 +0,0 @@
|
|||||||
apiVersion: metallb.io/v1beta1
|
|
||||||
kind: IPAddressPool
|
|
||||||
metadata:
|
|
||||||
name: cheap
|
|
||||||
spec:
|
|
||||||
addresses:
|
|
||||||
- 192.168.20.34-192.168.20.39
|
|
||||||
---
|
|
||||||
apiVersion: metallb.io/v1beta1
|
|
||||||
kind: L2Advertisement
|
|
||||||
metadata:
|
|
||||||
name: pool
|
|
||||||
namespace: metallb-system
|
|
||||||
spec:
|
|
||||||
ipAddressPools:
|
|
||||||
- cheap
|
|
||||||
|
|
||||||
@@ -1,197 +0,0 @@
|
|||||||
metallb:
|
|
||||||
imagePullSecrets: []
|
|
||||||
nameOverride: ""
|
|
||||||
fullnameOverride: ""
|
|
||||||
loadBalancerClass: ""
|
|
||||||
|
|
||||||
rbac:
|
|
||||||
create: true
|
|
||||||
|
|
||||||
prometheus:
|
|
||||||
scrapeAnnotations: false
|
|
||||||
metricsPort: 7472
|
|
||||||
speakerMetricsTLSSecret: ""
|
|
||||||
controllerMetricsTLSSecret: ""
|
|
||||||
rbacPrometheus: true
|
|
||||||
serviceAccount: ""
|
|
||||||
namespace: ""
|
|
||||||
rbacProxy:
|
|
||||||
repository: gcr.io/kubebuilder/kube-rbac-proxy
|
|
||||||
tag: v0.12.0
|
|
||||||
pullPolicy:
|
|
||||||
podMonitor:
|
|
||||||
enabled: false
|
|
||||||
additionalLabels: {}
|
|
||||||
annotations: {}
|
|
||||||
jobLabel: "app.kubernetes.io/name"
|
|
||||||
interval:
|
|
||||||
metricRelabelings: []
|
|
||||||
relabelings: []
|
|
||||||
serviceMonitor:
|
|
||||||
enabled: false
|
|
||||||
speaker:
|
|
||||||
additionalLabels: {}
|
|
||||||
annotations: {}
|
|
||||||
tlsConfig:
|
|
||||||
insecureSkipVerify: true
|
|
||||||
controller:
|
|
||||||
additionalLabels: {}
|
|
||||||
annotations: {}
|
|
||||||
tlsConfig:
|
|
||||||
insecureSkipVerify: true
|
|
||||||
jobLabel: "app.kubernetes.io/name"
|
|
||||||
interval:
|
|
||||||
metricRelabelings: []
|
|
||||||
relabelings: []
|
|
||||||
prometheusRule:
|
|
||||||
enabled: false
|
|
||||||
additionalLabels: {}
|
|
||||||
annotations: {}
|
|
||||||
staleConfig:
|
|
||||||
enabled: true
|
|
||||||
labels:
|
|
||||||
severity: warning
|
|
||||||
configNotLoaded:
|
|
||||||
enabled: true
|
|
||||||
labels:
|
|
||||||
severity: warning
|
|
||||||
addressPoolExhausted:
|
|
||||||
enabled: true
|
|
||||||
labels:
|
|
||||||
severity: alert
|
|
||||||
addressPoolUsage:
|
|
||||||
enabled: true
|
|
||||||
thresholds:
|
|
||||||
- percent: 75
|
|
||||||
labels:
|
|
||||||
severity: warning
|
|
||||||
- percent: 85
|
|
||||||
labels:
|
|
||||||
severity: warning
|
|
||||||
- percent: 95
|
|
||||||
labels:
|
|
||||||
severity: alert
|
|
||||||
bgpSessionDown:
|
|
||||||
enabled: true
|
|
||||||
labels:
|
|
||||||
severity: alert
|
|
||||||
|
|
||||||
extraAlerts: []
|
|
||||||
|
|
||||||
controller:
|
|
||||||
enabled: true
|
|
||||||
# -- Controller log level. Must be one of: `all`, `debug`, `info`, `warn`, `error` or `none`
|
|
||||||
logLevel: info
|
|
||||||
image:
|
|
||||||
repository: quay.io/metallb/controller
|
|
||||||
tag:
|
|
||||||
pullPolicy:
|
|
||||||
strategy:
|
|
||||||
type: RollingUpdate
|
|
||||||
serviceAccount:
|
|
||||||
create: true
|
|
||||||
name: ""
|
|
||||||
annotations: {}
|
|
||||||
securityContext:
|
|
||||||
runAsNonRoot: true
|
|
||||||
runAsUser: 65534
|
|
||||||
fsGroup: 65534
|
|
||||||
resources: {}
|
|
||||||
nodeSelector: {}
|
|
||||||
tolerations: []
|
|
||||||
priorityClassName: ""
|
|
||||||
runtimeClassName: ""
|
|
||||||
affinity: {}
|
|
||||||
podAnnotations: {}
|
|
||||||
labels: {}
|
|
||||||
livenessProbe:
|
|
||||||
enabled: true
|
|
||||||
failureThreshold: 3
|
|
||||||
initialDelaySeconds: 10
|
|
||||||
periodSeconds: 10
|
|
||||||
successThreshold: 1
|
|
||||||
timeoutSeconds: 1
|
|
||||||
readinessProbe:
|
|
||||||
enabled: true
|
|
||||||
failureThreshold: 3
|
|
||||||
initialDelaySeconds: 10
|
|
||||||
periodSeconds: 10
|
|
||||||
successThreshold: 1
|
|
||||||
timeoutSeconds: 1
|
|
||||||
tlsMinVersion: "VersionTLS12"
|
|
||||||
tlsCipherSuites: ""
|
|
||||||
|
|
||||||
extraContainers: []
|
|
||||||
|
|
||||||
speaker:
|
|
||||||
enabled: true
|
|
||||||
logLevel: debug
|
|
||||||
tolerateMaster: true
|
|
||||||
memberlist:
|
|
||||||
enabled: true
|
|
||||||
mlBindPort: 7946
|
|
||||||
mlBindAddrOverride: ""
|
|
||||||
mlSecretKeyPath: "/etc/ml_secret_key"
|
|
||||||
excludeInterfaces:
|
|
||||||
enabled: true
|
|
||||||
ignoreExcludeLB: false
|
|
||||||
|
|
||||||
image:
|
|
||||||
repository: quay.io/metallb/speaker
|
|
||||||
tag:
|
|
||||||
pullPolicy:
|
|
||||||
updateStrategy:
|
|
||||||
type: RollingUpdate
|
|
||||||
serviceAccount:
|
|
||||||
create: true
|
|
||||||
name: ""
|
|
||||||
annotations: {}
|
|
||||||
securityContext: {}
|
|
||||||
resources: {}
|
|
||||||
nodeSelector: {}
|
|
||||||
tolerations: []
|
|
||||||
priorityClassName: ""
|
|
||||||
affinity: {}
|
|
||||||
runtimeClassName: ""
|
|
||||||
podAnnotations: {}
|
|
||||||
labels:
|
|
||||||
pod-security.kubernetes.io/enforce: privileged
|
|
||||||
pod-security.kubernetes.io/audit: privileged
|
|
||||||
pod-security.kubernetes.io/warn: privileged
|
|
||||||
livenessProbe:
|
|
||||||
enabled: true
|
|
||||||
failureThreshold: 3
|
|
||||||
initialDelaySeconds: 10
|
|
||||||
periodSeconds: 10
|
|
||||||
successThreshold: 1
|
|
||||||
timeoutSeconds: 1
|
|
||||||
readinessProbe:
|
|
||||||
enabled: true
|
|
||||||
failureThreshold: 3
|
|
||||||
initialDelaySeconds: 10
|
|
||||||
periodSeconds: 10
|
|
||||||
successThreshold: 1
|
|
||||||
timeoutSeconds: 1
|
|
||||||
startupProbe:
|
|
||||||
enabled: true
|
|
||||||
failureThreshold: 30
|
|
||||||
periodSeconds: 5
|
|
||||||
frr:
|
|
||||||
enabled: true
|
|
||||||
image:
|
|
||||||
repository: quay.io/frrouting/frr
|
|
||||||
tag: 9.0.2
|
|
||||||
pullPolicy:
|
|
||||||
metricsPort: 7473
|
|
||||||
resources: {}
|
|
||||||
reloader:
|
|
||||||
resources: {}
|
|
||||||
frrMetrics:
|
|
||||||
resources: {}
|
|
||||||
extraContainers: []
|
|
||||||
crds:
|
|
||||||
enabled: true
|
|
||||||
validationFailurePolicy: Fail
|
|
||||||
frrk8s:
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
8
nfs-client/Chart.yml
Normal file
8
nfs-client/Chart.yml
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
apiVersion: v2
|
||||||
|
name: nfs-client
|
||||||
|
description: A Helm chart for Kubernetes
|
||||||
|
type: application
|
||||||
|
|
||||||
|
version: 0.1.0
|
||||||
|
appVersion: "1.16.0"
|
||||||
|
|
||||||
12
nfs-client/templates/cluster-role-binding.yml
Normal file
12
nfs-client/templates/cluster-role-binding.yml
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
kind: ClusterRoleBinding
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
metadata:
|
||||||
|
name: run-nfs-client-provisioner
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: nfs-client-provisioner
|
||||||
|
namespace: nfs-client
|
||||||
|
roleRef:
|
||||||
|
kind: ClusterRole
|
||||||
|
name: nfs-client-provisioner-runner
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
20
nfs-client/templates/cluster-role.yml
Normal file
20
nfs-client/templates/cluster-role.yml
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
kind: ClusterRole
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
metadata:
|
||||||
|
name: nfs-client-provisioner-runner
|
||||||
|
rules:
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["persistentvolumes"]
|
||||||
|
verbs: ["get", "list", "watch", "create", "delete"]
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["persistentvolumeclaims"]
|
||||||
|
verbs: ["get", "list", "watch", "update"]
|
||||||
|
- apiGroups: ["storage.k8s.io"]
|
||||||
|
resources: ["storageclasses"]
|
||||||
|
verbs: ["get", "list", "watch"]
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["events"]
|
||||||
|
verbs: ["create", "update", "patch"]
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["endpoints"]
|
||||||
|
verbs: ["get", "list", "watch", "create", "update", "patch"]
|
||||||
42
nfs-client/templates/provisioner.yml
Normal file
42
nfs-client/templates/provisioner.yml
Normal file
@@ -0,0 +1,42 @@
|
|||||||
|
kind: Deployment
|
||||||
|
apiVersion: apps/v1
|
||||||
|
metadata:
|
||||||
|
name: nfs-client-provisioner
|
||||||
|
namespace: nfs-client
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: nfs-client-provisioner
|
||||||
|
replicas: 1
|
||||||
|
strategy:
|
||||||
|
type: Recreate
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: nfs-client-provisioner
|
||||||
|
spec:
|
||||||
|
serviceAccountName: nfs-client-provisioner
|
||||||
|
containers:
|
||||||
|
- name: nfs-client-provisioner
|
||||||
|
image: gcr.io/k8s-staging-sig-storage/nfs-subdir-external-provisioner:v4.0.0
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
cpu: 500m
|
||||||
|
memory: 512Mi
|
||||||
|
limits:
|
||||||
|
memory: 1Gi
|
||||||
|
volumeMounts:
|
||||||
|
- name: nfs-client-ssd
|
||||||
|
mountPath: /persistentvolumes
|
||||||
|
env:
|
||||||
|
- name: PROVISIONER_NAME
|
||||||
|
value: durp.info/nfs
|
||||||
|
- name: NFS_SERVER
|
||||||
|
value: 192.168.20.253
|
||||||
|
- name: NFS_PATH
|
||||||
|
value: /mnt/user/k3s
|
||||||
|
volumes:
|
||||||
|
- name: nfs-client-ssd
|
||||||
|
nfs:
|
||||||
|
server: 192.168.20.253
|
||||||
|
path: /mnt/user/k3s
|
||||||
13
nfs-client/templates/role-binding.yml
Normal file
13
nfs-client/templates/role-binding.yml
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
kind: RoleBinding
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
metadata:
|
||||||
|
name: leader-locking-nfs-client-provisioner
|
||||||
|
namespace: nfs-client
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: nfs-client-provisioner
|
||||||
|
namespace: nfs-client
|
||||||
|
roleRef:
|
||||||
|
kind: Role
|
||||||
|
name: leader-locking-nfs-client-provisioner
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
9
nfs-client/templates/role.yml
Normal file
9
nfs-client/templates/role.yml
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
kind: Role
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
metadata:
|
||||||
|
name: leader-locking-nfs-client-provisioner
|
||||||
|
namespace: nfs-client
|
||||||
|
rules:
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["endpoints"]
|
||||||
|
verbs: ["get", "list", "watch", "create", "update", "patch"]
|
||||||
5
nfs-client/templates/service-account.yml
Normal file
5
nfs-client/templates/service-account.yml
Normal file
@@ -0,0 +1,5 @@
|
|||||||
|
kind: ServiceAccount
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: nfs-client-provisioner
|
||||||
|
namespace: nfs-client
|
||||||
10
nfs-client/templates/storage-class.yml
Normal file
10
nfs-client/templates/storage-class.yml
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
apiVersion: storage.k8s.io/v1
|
||||||
|
kind: StorageClass
|
||||||
|
metadata:
|
||||||
|
name: nfs-storage
|
||||||
|
annotations:
|
||||||
|
storageclass.kubernetes.io/is-default-class: "false"
|
||||||
|
provisioner: durp.info/nfs
|
||||||
|
parameters:
|
||||||
|
archiveOnDelete: "false"
|
||||||
|
reclaimPolicy: Retain
|
||||||
7
open-webui/Chart.yaml
Normal file
7
open-webui/Chart.yaml
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
apiVersion: v2
|
||||||
|
name: open-webui
|
||||||
|
description: A Helm chart for Kubernetes
|
||||||
|
type: application
|
||||||
|
|
||||||
|
version: 0.1.0
|
||||||
|
appVersion: "1.16.0"
|
||||||
37
open-webui/templates/deployment.yaml
Normal file
37
open-webui/templates/deployment.yaml
Normal file
@@ -0,0 +1,37 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
namespace: open-webui
|
||||||
|
name: open-webui
|
||||||
|
labels:
|
||||||
|
app: open-webui
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: open-webui
|
||||||
|
replicas: 1
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: open-webui
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: open-webui
|
||||||
|
image: registry.internal.durp.info/open-webui/open-webui:main
|
||||||
|
imagePullPolicy: Always
|
||||||
|
volumeMounts:
|
||||||
|
- name: open-webui-pvc
|
||||||
|
mountPath: /app/backend/data
|
||||||
|
ports:
|
||||||
|
- name: http
|
||||||
|
containerPort: 8080
|
||||||
|
env:
|
||||||
|
- name: OLLAMA_BASE_URL
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: open-webui-secret
|
||||||
|
key: OLLAMA_BASE_URL
|
||||||
|
volumes:
|
||||||
|
- name: open-webui-pvc
|
||||||
|
persistentVolumeClaim:
|
||||||
|
claimName: open-webui-pvc
|
||||||
42
open-webui/templates/ingress.yaml
Normal file
42
open-webui/templates/ingress.yaml
Normal file
@@ -0,0 +1,42 @@
|
|||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: open-webui-ingress
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host(`open-webui.durp.info`) && PathPrefix(`/`)
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: open-webui
|
||||||
|
port: 8080
|
||||||
|
tls:
|
||||||
|
secretName: open-webui-tls
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: cert-manager.io/v1
|
||||||
|
kind: Certificate
|
||||||
|
metadata:
|
||||||
|
name: open-webui-tls
|
||||||
|
spec:
|
||||||
|
secretName: open-webui-tls
|
||||||
|
issuerRef:
|
||||||
|
name: letsencrypt-production
|
||||||
|
kind: ClusterIssuer
|
||||||
|
commonName: "open-webui.durp.info"
|
||||||
|
dnsNames:
|
||||||
|
- "open-webui.durp.info"
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
kind: Service
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: open-webui-external-dns
|
||||||
|
annotations:
|
||||||
|
external-dns.alpha.kubernetes.io/hostname: open-webui.durp.info
|
||||||
|
spec:
|
||||||
|
type: ExternalName
|
||||||
|
externalName: durp.info
|
||||||
11
open-webui/templates/pvc.yaml
Normal file
11
open-webui/templates/pvc.yaml
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: PersistentVolumeClaim
|
||||||
|
metadata:
|
||||||
|
name: open-webui-pvc
|
||||||
|
spec:
|
||||||
|
storageClassName: longhorn
|
||||||
|
accessModes:
|
||||||
|
- ReadWriteMany
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: 10Gi
|
||||||
16
open-webui/templates/secrets.yaml
Normal file
16
open-webui/templates/secrets.yaml
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
apiVersion: external-secrets.io/v1beta1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: open-webui-secret
|
||||||
|
spec:
|
||||||
|
secretStoreRef:
|
||||||
|
name: vault
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
target:
|
||||||
|
name: open-webui-secret
|
||||||
|
data:
|
||||||
|
- secretKey: OLLAMA_BASE_URL
|
||||||
|
remoteRef:
|
||||||
|
key: secrets/open-webui
|
||||||
|
property: OLLAMA_BASE_URL
|
||||||
|
|
||||||
12
open-webui/templates/service.yaml
Normal file
12
open-webui/templates/service.yaml
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: open-webui
|
||||||
|
spec:
|
||||||
|
ports:
|
||||||
|
- name: http
|
||||||
|
port: 8080
|
||||||
|
targetPort: 8080
|
||||||
|
protocol: TCP
|
||||||
|
selector:
|
||||||
|
app: open-webui
|
||||||
37
vault/templates/ingress.yaml
Normal file
37
vault/templates/ingress.yaml
Normal file
@@ -0,0 +1,37 @@
|
|||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: vault-ingress
|
||||||
|
annotations:
|
||||||
|
cert-manager.io/cluster-issuer: letsencrypt-production
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host(`vault.internal.durp.info`)
|
||||||
|
middlewares:
|
||||||
|
- name: whitelist
|
||||||
|
namespace: traefik
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: vault
|
||||||
|
port: 8200
|
||||||
|
scheme: http
|
||||||
|
tls:
|
||||||
|
secretName: vault-tls
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: cert-manager.io/v1
|
||||||
|
kind: Certificate
|
||||||
|
metadata:
|
||||||
|
name: vault-tls
|
||||||
|
spec:
|
||||||
|
secretName: vault-tls
|
||||||
|
issuerRef:
|
||||||
|
name: letsencrypt-production
|
||||||
|
kind: ClusterIssuer
|
||||||
|
commonName: "vault.internal.durp.info"
|
||||||
|
dnsNames:
|
||||||
|
- "vault.internal.durp.info"
|
||||||
|
|
||||||
@@ -1,30 +1,14 @@
|
|||||||
#apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1beta1
|
||||||
#kind: ClusterSecretStore
|
kind: ClusterSecretStore
|
||||||
#metadata:
|
metadata:
|
||||||
# name: vault
|
name: vault
|
||||||
#spec:
|
spec:
|
||||||
# provider:
|
provider:
|
||||||
# vault:
|
vault:
|
||||||
# server: "http://vault.vault.svc.cluster.local:8200"
|
server: "http://vault.vault.svc.cluster.local:8200"
|
||||||
# path: "secrets"
|
path: "secrets"
|
||||||
# version: "v2"
|
version: "v2"
|
||||||
# auth:
|
auth:
|
||||||
# kubernetes:
|
kubernetes:
|
||||||
# mountPath: "kubernetes"
|
mountPath: "kubernetes"
|
||||||
# role: "dmz-external-secrets"
|
role: "external-secrets"
|
||||||
#---
|
|
||||||
#apiVersion: external-secrets.io/v1beta1
|
|
||||||
#kind: ClusterSecretStore
|
|
||||||
#metadata:
|
|
||||||
# name: vault
|
|
||||||
#spec:
|
|
||||||
# provider:
|
|
||||||
# vault:
|
|
||||||
# server: "https://vault.internal.prd.durp.info"
|
|
||||||
# path: "secrets"
|
|
||||||
# version: "v2"
|
|
||||||
# auth:
|
|
||||||
# tokenSecretRef:
|
|
||||||
# name: vault-token
|
|
||||||
# key: token
|
|
||||||
# namespace: external-secrets
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
vault:
|
vault:
|
||||||
|
|
||||||
global:
|
global:
|
||||||
externalVaultAddr: "https://vault.internal.prd.durp.info"
|
|
||||||
|
|
||||||
image:
|
image:
|
||||||
repository: "registry.internal.durp.info/hashicorp/vault-k8s"
|
repository: "registry.internal.durp.info/hashicorp/vault-k8s"
|
||||||
@@ -12,11 +11,10 @@ vault:
|
|||||||
repository: "registry.internal.durp.info/hashicorp/vault"
|
repository: "registry.internal.durp.info/hashicorp/vault"
|
||||||
tag: "1.15.2"
|
tag: "1.15.2"
|
||||||
|
|
||||||
|
|
||||||
injector:
|
injector:
|
||||||
enabled: "-"
|
enabled: "-"
|
||||||
|
|
||||||
replicas: 2
|
replicas: 3
|
||||||
leaderElector:
|
leaderElector:
|
||||||
enabled: true
|
enabled: true
|
||||||
|
|
||||||
@@ -32,3 +30,37 @@ vault:
|
|||||||
repository: "registry.internal.durp.info/hashicorp/vault"
|
repository: "registry.internal.durp.info/hashicorp/vault"
|
||||||
tag: "1.15.2"
|
tag: "1.15.2"
|
||||||
|
|
||||||
|
server:
|
||||||
|
enabled: "-"
|
||||||
|
image:
|
||||||
|
repository: "registry.internal.durp.info/hashicorp/vault"
|
||||||
|
tag: "1.15.2"
|
||||||
|
pullPolicy: Always
|
||||||
|
ha:
|
||||||
|
enabled: false
|
||||||
|
replicas: 3
|
||||||
|
resources: {}
|
||||||
|
# resources:
|
||||||
|
# requests:
|
||||||
|
# memory: 256Mi
|
||||||
|
# cpu: 250m
|
||||||
|
# limits:
|
||||||
|
# memory: 256Mi
|
||||||
|
# cpu: 250m
|
||||||
|
|
||||||
|
dataStorage:
|
||||||
|
enabled: true
|
||||||
|
size: 10Gi
|
||||||
|
storageClass: longhorn
|
||||||
|
accessMode: ReadWriteOnce
|
||||||
|
auditStorage:
|
||||||
|
enabled: false
|
||||||
|
size: 10Gi
|
||||||
|
mountPath: "/vault/audit"
|
||||||
|
storageClass: longhorn
|
||||||
|
accessMode: ReadWriteOnce
|
||||||
|
ui:
|
||||||
|
enabled: false
|
||||||
|
externalPort: 8200
|
||||||
|
targetPort: 8200
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user