Compare commits
116 Commits
dmz
...
f8899caf78
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
f8899caf78 | ||
|
|
b47edf477b | ||
| 54a82177f2 | |||
| f3684f197c | |||
| 5f693d0020 | |||
| 14a659df5b | |||
| 46724e763c | |||
| 33c5d25271 | |||
| 99006a8900 | |||
| a42b3e785d | |||
| c39f20e371 | |||
| dc324a2d8b | |||
| 2d4d3773b7 | |||
| 54e12aa8c1 | |||
| 47d4e5015e | |||
| e60030016e | |||
| 6645dd77f6 | |||
| f1f8a9e837 | |||
| 47214c5a93 | |||
| a1b05d6f8a | |||
| 8ca00e2715 | |||
| 7cbe7932f1 | |||
| 97d73b36c4 | |||
| 679742ab45 | |||
| 9b1680cfc8 | |||
| dd3ca7c9a4 | |||
| 4a67df78b3 | |||
| dde4eac238 | |||
| f9987ac705 | |||
| 6705352a10 | |||
| 599e86e1a9 | |||
| 4826c5beb6 | |||
| 1284e2ec60 | |||
| 7f6e182084 | |||
| a565952e0c | |||
| f64bdfbedd | |||
| e6a8aa74b4 | |||
| b1c45f939b | |||
| 3bfec1450f | |||
| d5224c0c7f | |||
| 4e37bfb8dc | |||
| 45ae3523b9 | |||
| 1151680f65 | |||
| 1aefb8163b | |||
| e935822058 | |||
| 49b23b1788 | |||
| bd2def6d46 | |||
| 10fcd43274 | |||
| 126c6e6f45 | |||
| 10ce90a460 | |||
| c3cd2c0b8b | |||
| 8b74b2efb6 | |||
| eecf949f86 | |||
| 2b951b2814 | |||
| a1293abaf6 | |||
| 5781c6ddda | |||
| 42fc48bb27 | |||
| 0f908a1460 | |||
| 1febc6915e | |||
| a99e0649dd | |||
| d28f17120b | |||
| 44d099ad9e | |||
| 5c866c2eb7 | |||
| 216cece298 | |||
| f16da3d3a8 | |||
| f12b7aa532 | |||
| 8ec254f59c | |||
| 33fd621ec8 | |||
| 89b8364fe5 | |||
| 52038a7585 | |||
| 885ab5e3d7 | |||
| 7843ae7c29 | |||
| e2d1e01708 | |||
| e8cafed885 | |||
| 62b7efad89 | |||
| 47ddf2fd28 | |||
| 31b689d5fe | |||
| 5ef03e6dbe | |||
| 38bb3538a3 | |||
| 8c77e53669 | |||
| 44aac27362 | |||
| 0f4048072d | |||
| b6f0c41d5d | |||
| 3259cd6f37 | |||
| 418162a9e0 | |||
| de022ea46b | |||
| a50214eafc | |||
| be2ee6274a | |||
| 1fbe3dbc95 | |||
| f8a13c4bff | |||
| c9d77c5eec | |||
| 3457eba0a2 | |||
| 738d19edfa | |||
| 23d397e5d4 | |||
| 10bfb6fd54 | |||
| 0ff6377bd6 | |||
| 8d92151ad3 | |||
| 3f74860c28 | |||
| f12af0f92f | |||
| 86a5af321d | |||
| 4a1e4f980d | |||
| bf6c021d8b | |||
| 0abc90d9cd | |||
| e2cabee7dd | |||
| 1f2fd56d89 | |||
| 785a256258 | |||
| 26c3a919c6 | |||
| 280298cc0a | |||
| f5b4c58367 | |||
| 0a3f3d99d7 | |||
| 21405024f7 | |||
| 61110282d5 | |||
| 5765f9b5d7 | |||
| f70c55dcf2 | |||
| b2212a6608 | |||
| 5e5a7b3803 |
101
dmz/internalproxy/templates/ollama.yaml
Normal file
101
dmz/internalproxy/templates/ollama.yaml
Normal file
@@ -0,0 +1,101 @@
|
||||
apiVersion: external-secrets.io/v1beta1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: ollama-secret
|
||||
spec:
|
||||
secretStoreRef:
|
||||
name: vault
|
||||
kind: ClusterSecretStore
|
||||
target:
|
||||
name: ollama-secret
|
||||
data:
|
||||
- secretKey: users
|
||||
remoteRef:
|
||||
key: secrets/internalproxy/ollama
|
||||
property: users
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: ollama-basic-auth
|
||||
spec:
|
||||
basicAuth:
|
||||
secret: ollama-secret
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: ollama
|
||||
spec:
|
||||
ports:
|
||||
- name: app
|
||||
port: 11435
|
||||
protocol: TCP
|
||||
targetPort: 11435
|
||||
clusterIP: None
|
||||
type: ClusterIP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Endpoints
|
||||
metadata:
|
||||
name: ollama
|
||||
subsets:
|
||||
- addresses:
|
||||
- ip: 192.168.20.104
|
||||
ports:
|
||||
- name: app
|
||||
port: 11435
|
||||
protocol: TCP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: ollama-ingress
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`ollama.durp.info`) && PathPrefix(`/`)
|
||||
middlewares:
|
||||
- name: ollama-basic-auth
|
||||
kind: Rule
|
||||
services:
|
||||
- name: ollama
|
||||
port: 11435
|
||||
tls:
|
||||
secretName: ollama-tls
|
||||
|
||||
---
|
||||
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: ollama-tls
|
||||
spec:
|
||||
secretName: ollama-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "ollama.durp.info"
|
||||
dnsNames:
|
||||
- "ollama.durp.info"
|
||||
|
||||
---
|
||||
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: ollama-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: ollama.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: durp.info
|
||||
@@ -1,33 +0,0 @@
|
||||
apiVersion: external-secrets.io/v1beta1
|
||||
kind: ClusterSecretStore
|
||||
metadata:
|
||||
name: vault
|
||||
spec:
|
||||
provider:
|
||||
vault:
|
||||
server: "https://vault.internal.prd.durp.info"
|
||||
path: "secrets"
|
||||
version: "v2"
|
||||
auth:
|
||||
kubernetes:
|
||||
mountPath: "kubernetes"
|
||||
role: "dmz-external-secrets"
|
||||
|
||||
---
|
||||
|
||||
apiVersion: external-secrets.io/v1beta1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: cloudflare-api-token-secret
|
||||
spec:
|
||||
secretStoreRef:
|
||||
name: vault
|
||||
kind: ClusterSecretStore
|
||||
target:
|
||||
name: cloudflare-api-token-secret
|
||||
data:
|
||||
- secretKey: cloudflare-api-token-secret
|
||||
remoteRef:
|
||||
key: secrets/cert-manager
|
||||
property: cloudflare-api-token-secret
|
||||
|
||||
@@ -1,277 +0,0 @@
|
||||
gatekeeper:
|
||||
replicas: 3
|
||||
revisionHistoryLimit: 10
|
||||
auditInterval: 60
|
||||
metricsBackends: ["prometheus"]
|
||||
auditMatchKindOnly: false
|
||||
constraintViolationsLimit: 20
|
||||
auditFromCache: false
|
||||
disableMutation: false
|
||||
disableValidatingWebhook: false
|
||||
validatingWebhookName: gatekeeper-validating-webhook-configuration
|
||||
validatingWebhookTimeoutSeconds: 3
|
||||
validatingWebhookFailurePolicy: Ignore
|
||||
validatingWebhookAnnotations: {}
|
||||
validatingWebhookExemptNamespacesLabels: {}
|
||||
validatingWebhookObjectSelector: {}
|
||||
validatingWebhookCheckIgnoreFailurePolicy: Fail
|
||||
validatingWebhookCustomRules: {}
|
||||
validatingWebhookURL: null
|
||||
enableDeleteOperations: false
|
||||
enableExternalData: true
|
||||
enableGeneratorResourceExpansion: true
|
||||
enableTLSHealthcheck: false
|
||||
maxServingThreads: -1
|
||||
mutatingWebhookName: gatekeeper-mutating-webhook-configuration
|
||||
mutatingWebhookFailurePolicy: Ignore
|
||||
mutatingWebhookReinvocationPolicy: Never
|
||||
mutatingWebhookAnnotations: {}
|
||||
mutatingWebhookExemptNamespacesLabels: {}
|
||||
mutatingWebhookObjectSelector: {}
|
||||
mutatingWebhookTimeoutSeconds: 1
|
||||
mutatingWebhookCustomRules: {}
|
||||
mutatingWebhookURL: null
|
||||
mutationAnnotations: false
|
||||
auditChunkSize: 500
|
||||
logLevel: INFO
|
||||
logDenies: false
|
||||
logMutations: false
|
||||
emitAdmissionEvents: false
|
||||
emitAuditEvents: false
|
||||
admissionEventsInvolvedNamespace: false
|
||||
auditEventsInvolvedNamespace: false
|
||||
resourceQuota: true
|
||||
externaldataProviderResponseCacheTTL: 3m
|
||||
image:
|
||||
repository: openpolicyagent/gatekeeper
|
||||
crdRepository: openpolicyagent/gatekeeper-crds
|
||||
release: v3.15.0-beta.0
|
||||
pullPolicy: Always
|
||||
pullSecrets: []
|
||||
preInstall:
|
||||
crdRepository:
|
||||
image:
|
||||
repository: null
|
||||
tag: v3.15.0-beta.0
|
||||
postUpgrade:
|
||||
labelNamespace:
|
||||
enabled: false
|
||||
image:
|
||||
repository: openpolicyagent/gatekeeper-crds
|
||||
tag: v3.15.0-beta.0
|
||||
pullPolicy: IfNotPresent
|
||||
pullSecrets: []
|
||||
extraNamespaces: []
|
||||
podSecurity: ["pod-security.kubernetes.io/audit=restricted",
|
||||
"pod-security.kubernetes.io/audit-version=latest",
|
||||
"pod-security.kubernetes.io/warn=restricted",
|
||||
"pod-security.kubernetes.io/warn-version=latest",
|
||||
"pod-security.kubernetes.io/enforce=restricted",
|
||||
"pod-security.kubernetes.io/enforce-version=v1.24"]
|
||||
extraAnnotations: {}
|
||||
priorityClassName: ""
|
||||
affinity: {}
|
||||
tolerations: []
|
||||
nodeSelector: {kubernetes.io/os: linux}
|
||||
resources: {}
|
||||
securityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
readOnlyRootFilesystem: true
|
||||
runAsGroup: 999
|
||||
runAsNonRoot: true
|
||||
runAsUser: 1000
|
||||
postInstall:
|
||||
labelNamespace:
|
||||
enabled: true
|
||||
extraRules: []
|
||||
image:
|
||||
repository: openpolicyagent/gatekeeper-crds
|
||||
tag: v3.15.0-beta.0
|
||||
pullPolicy: IfNotPresent
|
||||
pullSecrets: []
|
||||
extraNamespaces: []
|
||||
podSecurity: ["pod-security.kubernetes.io/audit=restricted",
|
||||
"pod-security.kubernetes.io/audit-version=latest",
|
||||
"pod-security.kubernetes.io/warn=restricted",
|
||||
"pod-security.kubernetes.io/warn-version=latest",
|
||||
"pod-security.kubernetes.io/enforce=restricted",
|
||||
"pod-security.kubernetes.io/enforce-version=v1.24"]
|
||||
extraAnnotations: {}
|
||||
priorityClassName: ""
|
||||
probeWebhook:
|
||||
enabled: true
|
||||
image:
|
||||
repository: curlimages/curl
|
||||
tag: 7.83.1
|
||||
pullPolicy: IfNotPresent
|
||||
pullSecrets: []
|
||||
waitTimeout: 60
|
||||
httpTimeout: 2
|
||||
insecureHTTPS: false
|
||||
priorityClassName: ""
|
||||
affinity: {}
|
||||
tolerations: []
|
||||
nodeSelector: {kubernetes.io/os: linux}
|
||||
securityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
readOnlyRootFilesystem: true
|
||||
runAsGroup: 999
|
||||
runAsNonRoot: true
|
||||
runAsUser: 1000
|
||||
preUninstall:
|
||||
deleteWebhookConfigurations:
|
||||
extraRules: []
|
||||
enabled: false
|
||||
image:
|
||||
repository: openpolicyagent/gatekeeper-crds
|
||||
tag: v3.15.0-beta.0
|
||||
pullPolicy: IfNotPresent
|
||||
pullSecrets: []
|
||||
priorityClassName: ""
|
||||
affinity: {}
|
||||
tolerations: []
|
||||
nodeSelector: {kubernetes.io/os: linux}
|
||||
resources: {}
|
||||
securityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
readOnlyRootFilesystem: true
|
||||
runAsGroup: 999
|
||||
runAsNonRoot: true
|
||||
runAsUser: 1000
|
||||
podAnnotations: {}
|
||||
auditPodAnnotations: {}
|
||||
podLabels: {}
|
||||
podCountLimit: "100"
|
||||
secretAnnotations: {}
|
||||
enableRuntimeDefaultSeccompProfile: true
|
||||
controllerManager:
|
||||
exemptNamespaces: []
|
||||
exemptNamespacePrefixes: []
|
||||
hostNetwork: false
|
||||
dnsPolicy: ClusterFirst
|
||||
port: 8443
|
||||
metricsPort: 8888
|
||||
healthPort: 9090
|
||||
readinessTimeout: 1
|
||||
livenessTimeout: 1
|
||||
priorityClassName: system-cluster-critical
|
||||
disableCertRotation: false
|
||||
tlsMinVersion: 1.3
|
||||
clientCertName: ""
|
||||
strategyType: RollingUpdate
|
||||
affinity:
|
||||
podAntiAffinity:
|
||||
preferredDuringSchedulingIgnoredDuringExecution:
|
||||
- podAffinityTerm:
|
||||
labelSelector:
|
||||
matchExpressions:
|
||||
- key: gatekeeper.sh/operation
|
||||
operator: In
|
||||
values:
|
||||
- webhook
|
||||
topologyKey: kubernetes.io/hostname
|
||||
weight: 100
|
||||
topologySpreadConstraints: []
|
||||
tolerations: []
|
||||
nodeSelector: {kubernetes.io/os: linux}
|
||||
resources:
|
||||
limits:
|
||||
memory: 512Mi
|
||||
requests:
|
||||
cpu: 100m
|
||||
memory: 512Mi
|
||||
securityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
readOnlyRootFilesystem: true
|
||||
runAsGroup: 999
|
||||
runAsNonRoot: true
|
||||
runAsUser: 1000
|
||||
podSecurityContext:
|
||||
fsGroup: 999
|
||||
supplementalGroups:
|
||||
- 999
|
||||
extraRules: []
|
||||
networkPolicy:
|
||||
enabled: false
|
||||
ingress: { }
|
||||
# - from:
|
||||
# - ipBlock:
|
||||
# cidr: 0.0.0.0/0
|
||||
audit:
|
||||
enablePubsub: false
|
||||
connection: audit-connection
|
||||
channel: audit-channel
|
||||
hostNetwork: false
|
||||
dnsPolicy: ClusterFirst
|
||||
metricsPort: 8888
|
||||
healthPort: 9090
|
||||
readinessTimeout: 1
|
||||
livenessTimeout: 1
|
||||
priorityClassName: system-cluster-critical
|
||||
disableCertRotation: false
|
||||
affinity: {}
|
||||
tolerations: []
|
||||
nodeSelector: {kubernetes.io/os: linux}
|
||||
resources:
|
||||
limits:
|
||||
memory: 512Mi
|
||||
requests:
|
||||
cpu: 100m
|
||||
memory: 512Mi
|
||||
securityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
readOnlyRootFilesystem: true
|
||||
runAsGroup: 999
|
||||
runAsNonRoot: true
|
||||
runAsUser: 1000
|
||||
podSecurityContext:
|
||||
fsGroup: 999
|
||||
supplementalGroups:
|
||||
- 999
|
||||
writeToRAMDisk: false
|
||||
extraRules: []
|
||||
crds:
|
||||
affinity: {}
|
||||
tolerations: []
|
||||
nodeSelector: {kubernetes.io/os: linux}
|
||||
resources: {}
|
||||
securityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
readOnlyRootFilesystem: true
|
||||
runAsGroup: 65532
|
||||
runAsNonRoot: true
|
||||
runAsUser: 65532
|
||||
pdb:
|
||||
controllerManager:
|
||||
minAvailable: 1
|
||||
service: {}
|
||||
disabledBuiltins: ["{http.send}"]
|
||||
psp:
|
||||
enabled: true
|
||||
upgradeCRDs:
|
||||
enabled: true
|
||||
extraRules: []
|
||||
priorityClassName: ""
|
||||
rbac:
|
||||
create: true
|
||||
externalCertInjection:
|
||||
enabled: false
|
||||
secretName: gatekeeper-webhook-server-cert
|
||||
12
infra/argocd/Chart.yaml
Normal file
12
infra/argocd/Chart.yaml
Normal file
@@ -0,0 +1,12 @@
|
||||
apiVersion: v2
|
||||
name: argocd
|
||||
description: A Helm chart for Kubernetes
|
||||
type: application
|
||||
|
||||
version: 0.1.0
|
||||
appVersion: "1.16.0"
|
||||
|
||||
dependencies:
|
||||
- name: argo-cd
|
||||
repository: https://argoproj.github.io/argo-helm
|
||||
version: 6.11.1
|
||||
40
infra/argocd/templates/argocd.yaml
Normal file
40
infra/argocd/templates/argocd.yaml
Normal file
@@ -0,0 +1,40 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: argocd
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: main
|
||||
path: infra/argocd
|
||||
destination:
|
||||
namespace: argocd
|
||||
name: in-cluster
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
|
||||
---
|
||||
|
||||
#apiVersion: external-secrets.io/v1beta1
|
||||
#kind: ExternalSecret
|
||||
#metadata:
|
||||
# name: vault-argocd
|
||||
# labels:
|
||||
# app.kubernetes.io/part-of: argocd
|
||||
#spec:
|
||||
# secretStoreRef:
|
||||
# name: vault
|
||||
# kind: ClusterSecretStore
|
||||
# target:
|
||||
# name: client-secret
|
||||
# data:
|
||||
# - secretKey: clientSecret
|
||||
# remoteRef:
|
||||
# key: secrets/argocd/authentik
|
||||
# property: clientsecret
|
||||
@@ -7,8 +7,8 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dmz
|
||||
path: longhorn
|
||||
targetRevision: main
|
||||
path: infra/longhorn
|
||||
destination:
|
||||
namespace: longhorn-system
|
||||
name: in-cluster
|
||||
@@ -9,4 +9,4 @@ appVersion: "1.16.0"
|
||||
dependencies:
|
||||
- name: longhorn
|
||||
repository: https://charts.longhorn.io
|
||||
version: 1.3.2
|
||||
version: 1.7.2
|
||||
41
infra/longhorn/templates/ingress.yaml
Normal file
41
infra/longhorn/templates/ingress.yaml
Normal file
@@ -0,0 +1,41 @@
|
||||
#apiVersion: traefik.containo.us/v1alpha1
|
||||
#kind: IngressRoute
|
||||
#metadata:
|
||||
# name: longhorn-ingress
|
||||
#spec:
|
||||
# entryPoints:
|
||||
# - websecure
|
||||
# routes:
|
||||
# - match: Host(`longhorn.internal.durp.info`) && PathPrefix(`/`)
|
||||
# middlewares:
|
||||
# - name: whitelist
|
||||
# namespace: traefik
|
||||
# - name: authentik-proxy-provider
|
||||
# namespace: traefik
|
||||
# kind: Rule
|
||||
# services:
|
||||
# - name: longhorn-frontend
|
||||
# port: 80
|
||||
# - match: Host(`longhorn.internal.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
|
||||
# kind: Rule
|
||||
# services:
|
||||
# - name: ak-outpost-authentik-embedded-outpost
|
||||
# namespace: authentik
|
||||
# port: 9000
|
||||
# tls:
|
||||
# secretName: longhorn-tls
|
||||
#
|
||||
#---
|
||||
#
|
||||
#apiVersion: cert-manager.io/v1
|
||||
#kind: Certificate
|
||||
#metadata:
|
||||
# name: longhorn-tls
|
||||
#spec:
|
||||
# secretName: longhorn-tls
|
||||
# issuerRef:
|
||||
# name: letsencrypt-production
|
||||
# kind: ClusterIssuer
|
||||
# commonName: "longhorn.internal.durp.info"
|
||||
# dnsNames:
|
||||
# - "longhorn.internal.durp.info"
|
||||
23
infra/longhorn/templates/secrets.yaml
Normal file
23
infra/longhorn/templates/secrets.yaml
Normal file
@@ -0,0 +1,23 @@
|
||||
#apiVersion: external-secrets.io/v1beta1
|
||||
#kind: ExternalSecret
|
||||
#metadata:
|
||||
# name: external-longhorn-backup-token-secret
|
||||
#spec:
|
||||
# secretStoreRef:
|
||||
# name: vault
|
||||
# kind: ClusterSecretStore
|
||||
# target:
|
||||
# name: longhorn-backup-token-secret
|
||||
# data:
|
||||
# - secretKey: AWS_ACCESS_KEY_ID
|
||||
# remoteRef:
|
||||
# key: secrets/longhorn/backup
|
||||
# property: AWS_ACCESS_KEY_ID
|
||||
# - secretKey: AWS_ENDPOINTS
|
||||
# remoteRef:
|
||||
# key: secrets/longhorn/backup
|
||||
# property: AWS_ENDPOINTS
|
||||
# - secretKey: AWS_SECRET_ACCESS_KEY
|
||||
# remoteRef:
|
||||
# key: secrets/longhorn/backup
|
||||
# property: AWS_SECRET_ACCESS_KEY
|
||||
195
infra/longhorn/values.yaml
Normal file
195
infra/longhorn/values.yaml
Normal file
@@ -0,0 +1,195 @@
|
||||
longhorn:
|
||||
global:
|
||||
cattle:
|
||||
systemDefaultRegistry: ""
|
||||
|
||||
image:
|
||||
longhorn:
|
||||
engine:
|
||||
repository: longhornio/longhorn-engine
|
||||
manager:
|
||||
repository: longhornio/longhorn-manager
|
||||
ui:
|
||||
repository: longhornio/longhorn-ui
|
||||
instanceManager:
|
||||
repository: longhornio/longhorn-instance-manager
|
||||
shareManager:
|
||||
repository: longhornio/longhorn-share-manager
|
||||
backingImageManager:
|
||||
repository: longhornio/backing-image-manager
|
||||
csi:
|
||||
attacher:
|
||||
repository: longhornio/csi-attacher
|
||||
provisioner:
|
||||
repository: longhornio/csi-provisioner
|
||||
nodeDriverRegistrar:
|
||||
repository: longhornio/csi-node-driver-registrar
|
||||
resizer:
|
||||
repository: longhornio/csi-resizer
|
||||
snapshotter:
|
||||
repository: longhornio/csi-snapshotter
|
||||
pullPolicy: Always
|
||||
|
||||
service:
|
||||
ui:
|
||||
type: ClusterIP
|
||||
nodePort: null
|
||||
manager:
|
||||
type: ClusterIP
|
||||
nodePort: ""
|
||||
loadBalancerIP: ""
|
||||
loadBalancerSourceRanges: ""
|
||||
|
||||
persistence:
|
||||
defaultClass: true
|
||||
defaultFsType: ext4
|
||||
defaultClassReplicaCount: 3
|
||||
defaultDataLocality: disabled # best-effort otherwise
|
||||
reclaimPolicy: Retain
|
||||
migratable: false
|
||||
recurringJobSelector:
|
||||
enable: true
|
||||
jobList: '[
|
||||
{
|
||||
"name":"backup",
|
||||
"task":"backup",
|
||||
"cron":"0 0 * * ?",
|
||||
"retain":24
|
||||
}
|
||||
]'
|
||||
backingImage:
|
||||
enable: false
|
||||
name: ~
|
||||
dataSourceType: ~
|
||||
dataSourceParameters: ~
|
||||
expectedChecksum: ~
|
||||
|
||||
csi:
|
||||
kubeletRootDir: ~
|
||||
attacherReplicaCount: ~
|
||||
provisionerReplicaCount: ~
|
||||
resizerReplicaCount: ~
|
||||
snapshotterReplicaCount: ~
|
||||
|
||||
defaultSettings:
|
||||
backupTarget: S3://longhorn-infra@us-east-1/
|
||||
backupTargetCredentialSecret: longhorn-backup-token-secret
|
||||
allowRecurringJobWhileVolumeDetached: ~
|
||||
createDefaultDiskLabeledNodes: ~
|
||||
defaultDataPath: ~
|
||||
defaultDataLocality: ~
|
||||
replicaSoftAntiAffinity: ~
|
||||
replicaAutoBalance: ~
|
||||
storageOverProvisioningPercentage: ~
|
||||
storageMinimalAvailablePercentage: ~
|
||||
upgradeChecker: ~
|
||||
defaultReplicaCount: ~
|
||||
defaultLonghornStaticStorageClass: longhorn
|
||||
backupstorePollInterval: ~
|
||||
taintToleration: ~
|
||||
systemManagedComponentsNodeSelector: ~
|
||||
priorityClass: ~
|
||||
autoSalvage: ~
|
||||
autoDeletePodWhenVolumeDetachedUnexpectedly: ~
|
||||
disableSchedulingOnCordonedNode: ~
|
||||
replicaZoneSoftAntiAffinity: ~
|
||||
nodeDownPodDeletionPolicy: ~
|
||||
allowNodeDrainWithLastHealthyReplica: ~
|
||||
mkfsExt4Parameters: ~
|
||||
disableReplicaRebuild: ~
|
||||
replicaReplenishmentWaitInterval: ~
|
||||
concurrentReplicaRebuildPerNodeLimit: ~
|
||||
disableRevisionCounter: ~
|
||||
systemManagedPodsImagePullPolicy: ~
|
||||
allowVolumeCreationWithDegradedAvailability: ~
|
||||
autoCleanupSystemGeneratedSnapshot: ~
|
||||
concurrentAutomaticEngineUpgradePerNodeLimit: ~
|
||||
backingImageCleanupWaitInterval: ~
|
||||
backingImageRecoveryWaitInterval: ~
|
||||
guaranteedEngineManagerCPU: ~
|
||||
guaranteedReplicaManagerCPU: ~
|
||||
kubernetesClusterAutoscalerEnabled: ~
|
||||
orphanAutoDeletion: ~
|
||||
storageNetwork: ~
|
||||
privateRegistry:
|
||||
createSecret: ~
|
||||
registryUrl: ~
|
||||
registryUser: ~
|
||||
registryPasswd: ~
|
||||
registrySecret: ~
|
||||
|
||||
longhornManager:
|
||||
priorityClass: ~
|
||||
tolerations: []
|
||||
## If you want to set tolerations for Longhorn Manager DaemonSet, delete the `[]` in the line above
|
||||
## and uncomment this example block
|
||||
# - key: "key"
|
||||
# operator: "Equal"
|
||||
# value: "value"
|
||||
# effect: "NoSchedule"
|
||||
nodeSelector: {}
|
||||
## If you want to set node selector for Longhorn Manager DaemonSet, delete the `{}` in the line above
|
||||
## and uncomment this example block
|
||||
# label-key1: "label-value1"
|
||||
# label-key2: "label-value2"
|
||||
|
||||
longhornDriver:
|
||||
priorityClass: ~
|
||||
tolerations: []
|
||||
## If you want to set tolerations for Longhorn Driver Deployer Deployment, delete the `[]` in the line above
|
||||
## and uncomment this example block
|
||||
# - key: "key"
|
||||
# operator: "Equal"
|
||||
# value: "value"
|
||||
# effect: "NoSchedule"
|
||||
nodeSelector: {}
|
||||
## If you want to set node selector for Longhorn Driver Deployer Deployment, delete the `{}` in the line above
|
||||
## and uncomment this example block
|
||||
# label-key1: "label-value1"
|
||||
# label-key2: "label-value2"
|
||||
|
||||
longhornUI:
|
||||
priorityClass: ~
|
||||
tolerations: []
|
||||
## If you want to set tolerations for Longhorn UI Deployment, delete the `[]` in the line above
|
||||
## and uncomment this example block
|
||||
# - key: "key"
|
||||
# operator: "Equal"
|
||||
# value: "value"
|
||||
# effect: "NoSchedule"
|
||||
nodeSelector: {}
|
||||
## If you want to set node selector for Longhorn UI Deployment, delete the `{}` in the line above
|
||||
## and uncomment this example block
|
||||
# label-key1: "label-value1"
|
||||
# label-key2: "label-value2"
|
||||
|
||||
resources: {}
|
||||
# We usually recommend not to specify default resources and to leave this as a conscious
|
||||
# choice for the user. This also increases chances charts run on environments with little
|
||||
# resources, such as Minikube. If you do want to specify resources, uncomment the following
|
||||
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
|
||||
# limits:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
#
|
||||
|
||||
ingress:
|
||||
enabled: false
|
||||
|
||||
# Configure a pod security policy in the Longhorn namespace to allow privileged pods
|
||||
enablePSP: true
|
||||
|
||||
## Specify override namespace, specifically this is useful for using longhorn as sub-chart
|
||||
## and its release namespace is not the `longhorn-system`
|
||||
namespaceOverride: ""
|
||||
|
||||
# Annotations to add to the Longhorn Manager DaemonSet Pods. Optional.
|
||||
annotations: {}
|
||||
|
||||
serviceAccount:
|
||||
# Annotations to add to the service account
|
||||
annotations: {}
|
||||
|
||||
@@ -1,9 +0,0 @@
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: gitea-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: gitea.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: durp.info
|
||||
@@ -1,71 +0,0 @@
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: guac-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: guac.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: durp.info
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: guac
|
||||
spec:
|
||||
ports:
|
||||
- name: app
|
||||
port: 8082
|
||||
protocol: TCP
|
||||
targetPort: 8082
|
||||
clusterIP: None
|
||||
type: ClusterIP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Endpoints
|
||||
metadata:
|
||||
name: guac
|
||||
subsets:
|
||||
- addresses:
|
||||
- ip: 192.168.20.253
|
||||
ports:
|
||||
- name: app
|
||||
port: 8082
|
||||
protocol: TCP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: guac-ingress
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`guac.durp.info`) && PathPrefix(`/`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: guac
|
||||
port: 8082
|
||||
tls:
|
||||
secretName: guac-tls
|
||||
|
||||
---
|
||||
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: guac-tls
|
||||
spec:
|
||||
secretName: guac-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "guac.durp.info"
|
||||
dnsNames:
|
||||
- "guac.durp.info"
|
||||
@@ -1,9 +0,0 @@
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: jellyfin-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: jellyfin.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: durp.info
|
||||
@@ -1,9 +0,0 @@
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: kasm-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: kasm.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: durp.info
|
||||
@@ -1,9 +0,0 @@
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: plex-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: plex.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: durp.info
|
||||
@@ -9,6 +9,6 @@ appVersion: "1.16.0"
|
||||
dependencies:
|
||||
- name: argo-cd
|
||||
repository: https://argoproj.github.io/argo-helm
|
||||
version: 6.7.11
|
||||
version: 6.11.1
|
||||
|
||||
|
||||
@@ -7,8 +7,8 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dmz
|
||||
path: internalproxy
|
||||
targetRevision: main
|
||||
path: master/internalproxy
|
||||
directory:
|
||||
recurse: true
|
||||
destination:
|
||||
59
master/argocd/templates/argocd.yaml
Normal file
59
master/argocd/templates/argocd.yaml
Normal file
@@ -0,0 +1,59 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: argocd
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: main
|
||||
path: master/argocd
|
||||
destination:
|
||||
namespace: argocd
|
||||
name: in-cluster
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: argocd-ingress
|
||||
annotations:
|
||||
cert-manager.io/cluster-issuer: letsencrypt-production
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`argocd.internal.durp.info`)
|
||||
middlewares:
|
||||
- name: whitelist
|
||||
namespace: traefik
|
||||
kind: Rule
|
||||
services:
|
||||
- name: argocd-server
|
||||
port: 443
|
||||
scheme: https
|
||||
tls:
|
||||
secretName: argocd-tls
|
||||
|
||||
---
|
||||
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: argocd-tls
|
||||
spec:
|
||||
secretName: argocd-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "argocd.internal.durp.info"
|
||||
dnsNames:
|
||||
- "argocd.internal.durp.info"
|
||||
@@ -1,16 +1,16 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: vault
|
||||
name: authentik
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dmz
|
||||
path: vault
|
||||
targetRevision: main
|
||||
path: master/authentik
|
||||
destination:
|
||||
namespace: vault
|
||||
namespace: authentik
|
||||
name: in-cluster
|
||||
syncPolicy:
|
||||
automated:
|
||||
@@ -18,8 +18,4 @@ spec:
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
ignoreDifferences:
|
||||
- group: admissionregistration.k8s.io
|
||||
kind: MutatingWebhookConfiguration
|
||||
jqPathExpressions:
|
||||
- .webhooks[]?.clientConfig.caBundle
|
||||
|
||||
23
master/argocd/templates/bitwarden.yaml
Normal file
23
master/argocd/templates/bitwarden.yaml
Normal file
@@ -0,0 +1,23 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: bitwarden
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: main
|
||||
path: master/bitwarden
|
||||
directory:
|
||||
recurse: true
|
||||
destination:
|
||||
server: https://kubernetes.default.svc
|
||||
namespace: bitwarden
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: false
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
|
||||
@@ -7,8 +7,8 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dmz
|
||||
path: cert-manager
|
||||
targetRevision: main
|
||||
path: master/cert-manager
|
||||
destination:
|
||||
namespace: cert-manager
|
||||
name: in-cluster
|
||||
20
master/argocd/templates/crossplane.yml
Normal file
20
master/argocd/templates/crossplane.yml
Normal file
@@ -0,0 +1,20 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: crossplane
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: main
|
||||
path: master/crossplane
|
||||
destination:
|
||||
namespace: crossplane
|
||||
name: in-cluster
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
20
master/argocd/templates/durpapi.yaml
Normal file
20
master/argocd/templates/durpapi.yaml
Normal file
@@ -0,0 +1,20 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: durpapi
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: main
|
||||
path: master/durpapi
|
||||
destination:
|
||||
namespace: durpapi
|
||||
name: in-cluster
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
@@ -1,16 +1,16 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: argocd
|
||||
name: durpot
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dmz
|
||||
path: argocd
|
||||
targetRevision: main
|
||||
path: master/durpot
|
||||
destination:
|
||||
namespace: argocd
|
||||
namespace: durpot
|
||||
name: in-cluster
|
||||
syncPolicy:
|
||||
automated:
|
||||
@@ -7,8 +7,8 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dmz
|
||||
path: external-dns
|
||||
targetRevision: main
|
||||
path: master/external-dns
|
||||
destination:
|
||||
namespace: external-dns
|
||||
name: in-cluster
|
||||
@@ -7,8 +7,8 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dmz
|
||||
path: external-secrets
|
||||
targetRevision: main
|
||||
path: master/external-secrets
|
||||
destination:
|
||||
namespace: external-secrets
|
||||
name: in-cluster
|
||||
@@ -7,8 +7,8 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dmz
|
||||
path: gatekeeper
|
||||
targetRevision: main
|
||||
path: master/gatekeeper
|
||||
destination:
|
||||
namespace: gatekeeper
|
||||
name: in-cluster
|
||||
@@ -7,8 +7,8 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dmz
|
||||
path: gitlab-runner
|
||||
targetRevision: main
|
||||
path: master/gitlab-runner
|
||||
destination:
|
||||
namespace: gitlab-runner
|
||||
name: in-cluster
|
||||
20
master/argocd/templates/heimdall.yaml
Normal file
20
master/argocd/templates/heimdall.yaml
Normal file
@@ -0,0 +1,20 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: heimdall
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: main
|
||||
path: master/heimdall
|
||||
destination:
|
||||
namespace: heimdall
|
||||
name: in-cluster
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
20
master/argocd/templates/krakend.yaml
Normal file
20
master/argocd/templates/krakend.yaml
Normal file
@@ -0,0 +1,20 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: krakend
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: main
|
||||
path: master/krakend
|
||||
destination:
|
||||
namespace: krakend
|
||||
name: in-cluster
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
@@ -7,8 +7,8 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dmz
|
||||
path: kube-prometheus-stack
|
||||
targetRevision: main
|
||||
path: master/kube-prometheus-stack
|
||||
destination:
|
||||
namespace: kube-prometheus-stack
|
||||
name: in-cluster
|
||||
@@ -7,8 +7,8 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dmz
|
||||
path: kubeclarity
|
||||
targetRevision: main
|
||||
path: master/kubeclarity
|
||||
destination:
|
||||
namespace: kubeclarity
|
||||
name: in-cluster
|
||||
22
master/argocd/templates/littlelink.yaml
Normal file
22
master/argocd/templates/littlelink.yaml
Normal file
@@ -0,0 +1,22 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: littlelink
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: main
|
||||
path: master/littlelink
|
||||
directory:
|
||||
recurse: true
|
||||
destination:
|
||||
server: https://kubernetes.default.svc
|
||||
namespace: littlelink
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
21
master/argocd/templates/longhorn.yaml
Normal file
21
master/argocd/templates/longhorn.yaml
Normal file
@@ -0,0 +1,21 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: longhorn-system
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: main
|
||||
path: master/longhorn
|
||||
destination:
|
||||
namespace: longhorn-system
|
||||
name: in-cluster
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
|
||||
@@ -7,8 +7,8 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dmz
|
||||
path: metallb-system
|
||||
targetRevision: main
|
||||
path: master/metallb-system
|
||||
destination:
|
||||
namespace: metallb-system
|
||||
name: in-cluster
|
||||
23
master/argocd/templates/nfs-client.yaml
Normal file
23
master/argocd/templates/nfs-client.yaml
Normal file
@@ -0,0 +1,23 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: nfs-client
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: main
|
||||
path: master/nfs-client
|
||||
directory:
|
||||
recurse: true
|
||||
destination:
|
||||
namespace: nfs-client
|
||||
name: in-cluster
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
|
||||
20
master/argocd/templates/open-webui.yaml
Normal file
20
master/argocd/templates/open-webui.yaml
Normal file
@@ -0,0 +1,20 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: open-webui
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: main
|
||||
path: master/open-webui
|
||||
destination:
|
||||
namespace: open-webui
|
||||
name: in-cluster
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
17
master/argocd/templates/secrets.yaml
Normal file
17
master/argocd/templates/secrets.yaml
Normal file
@@ -0,0 +1,17 @@
|
||||
apiVersion: external-secrets.io/v1beta1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: vault-argocd
|
||||
labels:
|
||||
app.kubernetes.io/part-of: argocd
|
||||
spec:
|
||||
secretStoreRef:
|
||||
name: vault
|
||||
kind: ClusterSecretStore
|
||||
target:
|
||||
name: client-secret
|
||||
data:
|
||||
- secretKey: clientSecret
|
||||
remoteRef:
|
||||
key: secrets/argocd/authentik
|
||||
property: clientsecret
|
||||
@@ -7,8 +7,8 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dmz
|
||||
path: traefik
|
||||
targetRevision: main
|
||||
path: master/traefik
|
||||
destination:
|
||||
namespace: traefik
|
||||
name: in-cluster
|
||||
@@ -7,8 +7,8 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dmz
|
||||
path: uptimekuma
|
||||
targetRevision: main
|
||||
path: master/uptimekuma
|
||||
directory:
|
||||
recurse: true
|
||||
destination:
|
||||
25
master/argocd/templates/vault.yaml
Normal file
25
master/argocd/templates/vault.yaml
Normal file
@@ -0,0 +1,25 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: vault
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: main
|
||||
path: master/vault
|
||||
destination:
|
||||
namespace: vault
|
||||
name: in-cluster
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
ignoreDifferences:
|
||||
- group: admissionregistration.k8s.io
|
||||
kind: MutatingWebhookConfiguration
|
||||
jqPathExpressions:
|
||||
- .webhooks[]?.clientConfig.caBundle
|
||||
62
master/argocd/values.yaml
Normal file
62
master/argocd/values.yaml
Normal file
@@ -0,0 +1,62 @@
|
||||
argo-cd:
|
||||
|
||||
global:
|
||||
revisionHistoryLimit: 1
|
||||
image:
|
||||
repository: registry.internal.durp.info/argoproj/argocd
|
||||
imagePullPolicy: Always
|
||||
|
||||
server:
|
||||
#extraArgs:
|
||||
# - --dex-server-plaintext
|
||||
# - --dex-server=argocd-dex-server:5556
|
||||
# oidc.config: |
|
||||
# name: AzureAD
|
||||
# issuer: https://login.microsoftonline.com/TENANT_ID/v2.0
|
||||
# clientID: CLIENT_ID
|
||||
# clientSecret: $oidc.azuread.clientSecret
|
||||
# requestedIDTokenClaims:
|
||||
# groups:
|
||||
# essential: true
|
||||
# requestedScopes:
|
||||
# - openid
|
||||
# - profile
|
||||
# - email
|
||||
|
||||
dex:
|
||||
enabled: true
|
||||
image:
|
||||
repository: registry.internal.durp.info/dexidp/dex
|
||||
imagePullPolicy: Always
|
||||
|
||||
configs:
|
||||
cm:
|
||||
create: true
|
||||
annotations: {}
|
||||
url: https://argocd.internal.durp.info
|
||||
oidc.tls.insecure.skip.verify: "true"
|
||||
dex.config: |
|
||||
connectors:
|
||||
- config:
|
||||
issuer: https://authentik.durp.info/application/o/argocd/
|
||||
clientID: dbb8ffc06104fb6e7fac3e4ae7fafb1d90437625
|
||||
clientSecret: $client-secret:clientSecret
|
||||
insecureEnableGroups: true
|
||||
scopes:
|
||||
- openid
|
||||
- profile
|
||||
- email
|
||||
- groups
|
||||
name: authentik
|
||||
type: oidc
|
||||
id: authentik
|
||||
|
||||
rbac:
|
||||
create: true
|
||||
policy.csv: |
|
||||
g, ArgoCD Admins, role:admin
|
||||
scopes: "[groups]"
|
||||
|
||||
server:
|
||||
route:
|
||||
enabled: false
|
||||
12
master/authentik/Chart.yaml
Normal file
12
master/authentik/Chart.yaml
Normal file
@@ -0,0 +1,12 @@
|
||||
apiVersion: v2
|
||||
name: authentik
|
||||
description: A Helm chart for Kubernetes
|
||||
type: application
|
||||
|
||||
version: 0.1.0
|
||||
appVersion: "1.16.0"
|
||||
|
||||
dependencies:
|
||||
- name: authentik
|
||||
repository: https://charts.goauthentik.io
|
||||
version: 2024.8.3
|
||||
24
master/authentik/templates/authentik-pv.yaml
Normal file
24
master/authentik/templates/authentik-pv.yaml
Normal file
@@ -0,0 +1,24 @@
|
||||
#apiVersion: v1
|
||||
#kind: PersistentVolume
|
||||
#metadata:
|
||||
# annotations:
|
||||
# pv.kubernetes.io/provisioned-by: durp.info/nfs
|
||||
# finalizers:
|
||||
# - kubernetes.io/pv-protection
|
||||
# name: authentik-pv
|
||||
#spec:
|
||||
# accessModes:
|
||||
# - ReadWriteMany
|
||||
# capacity:
|
||||
# storage: 10Gi
|
||||
# claimRef:
|
||||
# apiVersion: v1
|
||||
# kind: PersistentVolumeClaim
|
||||
# name: authentik-pvc
|
||||
# namespace: authentik
|
||||
# nfs:
|
||||
# path: /mnt/user/k3s/authentik
|
||||
# server: 192.168.20.253
|
||||
# persistentVolumeReclaimPolicy: Retain
|
||||
# storageClassName: nfs-storage
|
||||
# volumeMode: Filesystem
|
||||
18
master/authentik/templates/authentik-pvc.yaml
Normal file
18
master/authentik/templates/authentik-pvc.yaml
Normal file
@@ -0,0 +1,18 @@
|
||||
#apiVersion: v1
|
||||
#kind: PersistentVolumeClaim
|
||||
#metadata:
|
||||
# labels:
|
||||
# app.kubernetes.io/component: app
|
||||
# app.kubernetes.io/instance: authentik
|
||||
# app.kubernetes.io/managed-by: Helm
|
||||
# app.kubernetes.io/name: authentik
|
||||
# helm.sh/chart: authentik-2.14.4
|
||||
# name: authentik-pvc
|
||||
# namespace: authentik
|
||||
#spec:
|
||||
# accessModes:
|
||||
# - ReadWriteMany
|
||||
# resources:
|
||||
# requests:
|
||||
# storage: 10Gi
|
||||
# storageClassName: nfs-storage
|
||||
42
master/authentik/templates/ingress.yaml
Normal file
42
master/authentik/templates/ingress.yaml
Normal file
@@ -0,0 +1,42 @@
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: authentik-ingress
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`authentik.durp.info`) && PathPrefix(`/`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: authentik-server
|
||||
port: 80
|
||||
tls:
|
||||
secretName: authentik-tls
|
||||
|
||||
---
|
||||
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: authentik-tls
|
||||
spec:
|
||||
secretName: authentik-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "authentik.durp.info"
|
||||
dnsNames:
|
||||
- "authentik.durp.info"
|
||||
|
||||
---
|
||||
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: authentik-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: authentik.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: durp.info
|
||||
28
master/authentik/templates/secrets.yaml
Normal file
28
master/authentik/templates/secrets.yaml
Normal file
@@ -0,0 +1,28 @@
|
||||
apiVersion: external-secrets.io/v1beta1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: authentik-secret
|
||||
spec:
|
||||
secretStoreRef:
|
||||
name: vault
|
||||
kind: ClusterSecretStore
|
||||
target:
|
||||
name: db-pass
|
||||
data:
|
||||
- secretKey: dbpass
|
||||
remoteRef:
|
||||
key: secrets/authentik/database
|
||||
property: dbpass
|
||||
- secretKey: secretkey
|
||||
remoteRef:
|
||||
key: secrets/authentik/database
|
||||
property: secretkey
|
||||
- secretKey: postgresql-postgres-password
|
||||
remoteRef:
|
||||
key: secrets/authentik/database
|
||||
property: dbpass
|
||||
- secretKey: postgresql-password
|
||||
remoteRef:
|
||||
key: secrets/authentik/database
|
||||
property: dbpass
|
||||
|
||||
56
master/authentik/values.yaml
Normal file
56
master/authentik/values.yaml
Normal file
@@ -0,0 +1,56 @@
|
||||
authentik:
|
||||
global:
|
||||
env:
|
||||
- name: AUTHENTIK_POSTGRESQL__PASSWORD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: db-pass
|
||||
key: dbpass
|
||||
- name: AUTHENTIK_SECRET_KEY
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: db-pass
|
||||
key: secretkey
|
||||
revisionHistoryLimit: 1
|
||||
image:
|
||||
repository: registry.internal.durp.info/goauthentik/server
|
||||
pullPolicy: Always
|
||||
authentik:
|
||||
outposts:
|
||||
container_image_base: registry.internal.durp.info/goauthentik/%(type)s:%(version)s
|
||||
postgresql:
|
||||
host: '{{ .Release.Name }}-postgresql-hl'
|
||||
name: "authentik"
|
||||
user: "authentik"
|
||||
port: 5432
|
||||
server:
|
||||
name: server
|
||||
replicas: 3
|
||||
worker:
|
||||
replicas: 3
|
||||
postgresql:
|
||||
enabled: true
|
||||
image:
|
||||
registry: registry.internal.durp.info
|
||||
repository: bitnami/postgresql
|
||||
pullPolicy: Always
|
||||
postgresqlUsername: "authentik"
|
||||
postgresqlDatabase: "authentik"
|
||||
existingSecret: db-pass
|
||||
persistence:
|
||||
enabled: true
|
||||
storageClass: longhorn
|
||||
accessModes:
|
||||
- ReadWriteMany
|
||||
redis:
|
||||
enabled: true
|
||||
master:
|
||||
persistence:
|
||||
enabled: false
|
||||
image:
|
||||
registry: registry.internal.durp.info
|
||||
repository: bitnami/redis
|
||||
pullPolicy: Always
|
||||
architecture: standalone
|
||||
auth:
|
||||
enabled: false
|
||||
7
master/bitwarden/Chart.yaml
Normal file
7
master/bitwarden/Chart.yaml
Normal file
@@ -0,0 +1,7 @@
|
||||
apiVersion: v2
|
||||
name: bitwarden
|
||||
description: A Helm chart for Kubernetes
|
||||
type: application
|
||||
|
||||
version: 0.1.0
|
||||
appVersion: "1.16.0"
|
||||
25
master/bitwarden/templates/bitwarden-pv.yaml
Normal file
25
master/bitwarden/templates/bitwarden-pv.yaml
Normal file
@@ -0,0 +1,25 @@
|
||||
#apiVersion: v1
|
||||
#kind: PersistentVolume
|
||||
#metadata:
|
||||
# annotations:
|
||||
# pv.kubernetes.io/provisioned-by: durp.info/nfs
|
||||
# finalizers:
|
||||
# - kubernetes.io/pv-protection
|
||||
# name: bitwarden-pv
|
||||
#spec:
|
||||
# accessModes:
|
||||
# - ReadWriteMany
|
||||
# capacity:
|
||||
# storage: 10Gi
|
||||
# claimRef:
|
||||
# apiVersion: v1
|
||||
# kind: PersistentVolumeClaim
|
||||
# name: bitwarden-pvc
|
||||
# namespace: bitwarden
|
||||
# nfs:
|
||||
# path: /mnt/user/k3s/bitwarden
|
||||
# server: 192.168.20.253
|
||||
# persistentVolumeReclaimPolicy: Retain
|
||||
# storageClassName: nfs-storage
|
||||
# volumeMode: Filesystem
|
||||
#
|
||||
11
master/bitwarden/templates/bitwarden-pvc.yaml
Normal file
11
master/bitwarden/templates/bitwarden-pvc.yaml
Normal file
@@ -0,0 +1,11 @@
|
||||
apiVersion: v1
|
||||
kind: PersistentVolumeClaim
|
||||
metadata:
|
||||
name: bitwarden-pvc
|
||||
spec:
|
||||
storageClassName: longhorn
|
||||
accessModes:
|
||||
- ReadWriteMany
|
||||
resources:
|
||||
requests:
|
||||
storage: 10Gi
|
||||
50
master/bitwarden/templates/deployment.yaml
Normal file
50
master/bitwarden/templates/deployment.yaml
Normal file
@@ -0,0 +1,50 @@
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
namespace: bitwarden
|
||||
name: bitwarden
|
||||
labels:
|
||||
app: bitwarden
|
||||
spec:
|
||||
selector:
|
||||
matchLabels:
|
||||
app: bitwarden
|
||||
replicas: 1
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app: bitwarden
|
||||
spec:
|
||||
containers:
|
||||
- name: bitwarden
|
||||
image: registry.internal.durp.info/vaultwarden/server:1.32.7
|
||||
imagePullPolicy: Always
|
||||
volumeMounts:
|
||||
- name: bitwarden-pvc
|
||||
mountPath: /data
|
||||
subPath: bitwaren-data
|
||||
ports:
|
||||
- name: http
|
||||
containerPort: 80
|
||||
env:
|
||||
- name: SIGNUPS_ALLOWED
|
||||
value: "FALSE"
|
||||
- name: INVITATIONS_ALLOWED
|
||||
value: "FALSE"
|
||||
- name: WEBSOCKET_ENABLED
|
||||
value: "TRUE"
|
||||
- name: ROCKET_ENV
|
||||
value: "staging"
|
||||
- name: ROCKET_PORT
|
||||
value: "80"
|
||||
- name: ROCKET_WORKERS
|
||||
value: "10"
|
||||
- name: SECRET_USERNAME
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: bitwarden-secret
|
||||
key: ADMIN_TOKEN
|
||||
volumes:
|
||||
- name: bitwarden-pvc
|
||||
persistentVolumeClaim:
|
||||
claimName: bitwarden-pvc
|
||||
42
master/bitwarden/templates/ingress.yaml
Normal file
42
master/bitwarden/templates/ingress.yaml
Normal file
@@ -0,0 +1,42 @@
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: bitwarden-ingress
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`bitwarden.durp.info`) && PathPrefix(`/`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: bitwarden
|
||||
port: 80
|
||||
tls:
|
||||
secretName: bitwarden-tls
|
||||
|
||||
---
|
||||
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: bitwarden-tls
|
||||
spec:
|
||||
secretName: bitwarden-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "bitwarden.durp.info"
|
||||
dnsNames:
|
||||
- "bitwarden.durp.info"
|
||||
|
||||
---
|
||||
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: bitwarden-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: bitwarden.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: durp.info
|
||||
16
master/bitwarden/templates/secrets.yaml
Normal file
16
master/bitwarden/templates/secrets.yaml
Normal file
@@ -0,0 +1,16 @@
|
||||
apiVersion: external-secrets.io/v1beta1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: bitwarden-secret
|
||||
spec:
|
||||
secretStoreRef:
|
||||
name: vault
|
||||
kind: ClusterSecretStore
|
||||
target:
|
||||
name: bitwarden-secret
|
||||
data:
|
||||
- secretKey: ADMIN_TOKEN
|
||||
remoteRef:
|
||||
key: secrets/bitwarden/admin
|
||||
property: ADMIN_TOKEN
|
||||
|
||||
12
master/bitwarden/templates/service.yaml
Normal file
12
master/bitwarden/templates/service.yaml
Normal file
@@ -0,0 +1,12 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: bitwarden
|
||||
spec:
|
||||
ports:
|
||||
- name: http
|
||||
port: 80
|
||||
targetPort: 80
|
||||
protocol: TCP
|
||||
selector:
|
||||
app: bitwarden
|
||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
||||
dependencies:
|
||||
- name: cert-manager
|
||||
repository: https://charts.jetstack.io
|
||||
version: 1.*.*
|
||||
version: v1.15.3
|
||||
12
master/crossplane/Chart.yaml
Normal file
12
master/crossplane/Chart.yaml
Normal file
@@ -0,0 +1,12 @@
|
||||
apiVersion: v2
|
||||
name: crossplane
|
||||
description: A Helm chart for Kubernetes
|
||||
type: application
|
||||
|
||||
version: 0.1.0
|
||||
appVersion: "1.16.0"
|
||||
|
||||
dependencies:
|
||||
- name: crossplane
|
||||
repository: https://charts.crossplane.io/stable
|
||||
version: 1.17.1
|
||||
55
master/crossplane/templates/gitlab.yml
Normal file
55
master/crossplane/templates/gitlab.yml
Normal file
@@ -0,0 +1,55 @@
|
||||
apiVersion: pkg.crossplane.io/v1
|
||||
kind: Provider
|
||||
metadata:
|
||||
name: provider-gitlab
|
||||
spec:
|
||||
package: xpkg.upbound.io/crossplane-contrib/provider-gitlab:v0.5.0
|
||||
---
|
||||
|
||||
apiVersion: external-secrets.io/v1beta1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: gitlab-secret
|
||||
spec:
|
||||
secretStoreRef:
|
||||
name: vault
|
||||
kind: ClusterSecretStore
|
||||
target:
|
||||
name: gitlab-secret
|
||||
data:
|
||||
- secretKey: accesstoken
|
||||
remoteRef:
|
||||
key: secrets/gitlab/token
|
||||
property: accesstoken
|
||||
|
||||
---
|
||||
|
||||
#apiVersion: gitlab.crossplane.io/v1beta1
|
||||
#kind: ProviderConfig
|
||||
#metadata:
|
||||
# name: gitlab-provider
|
||||
#spec:
|
||||
# baseURL: https://gitlab.com/
|
||||
# credentials:
|
||||
# source: Secret
|
||||
# secretRef:
|
||||
# namespace: crossplane
|
||||
# name: gitlab-secret
|
||||
# key: accesstoken
|
||||
#
|
||||
#---
|
||||
#
|
||||
#apiVersion: projects.gitlab.crossplane.io/v1alpha1
|
||||
#kind: Project
|
||||
#metadata:
|
||||
# name: example-project
|
||||
#spec:
|
||||
# deletionPolicy: Orphan
|
||||
# forProvider:
|
||||
# name: "Example Project"
|
||||
# description: "example project description"
|
||||
# providerConfigRef:
|
||||
# name: gitlab-provider
|
||||
# policy:
|
||||
# resolution: Optional
|
||||
# resolve: Always
|
||||
1506
master/dashboards/nginx-dashboard.yaml
Normal file
1506
master/dashboards/nginx-dashboard.yaml
Normal file
File diff suppressed because it is too large
Load Diff
13
master/durpapi/Chart.yaml
Normal file
13
master/durpapi/Chart.yaml
Normal file
@@ -0,0 +1,13 @@
|
||||
apiVersion: v2
|
||||
name: durpapi
|
||||
description: A Helm chart for Kubernetes
|
||||
type: application
|
||||
|
||||
version: 0.1.0-dev0184
|
||||
appVersion: 0.1.0
|
||||
|
||||
dependencies:
|
||||
- condition: postgresql.enabled
|
||||
version: 12.5.*
|
||||
repository: https://charts.bitnami.com/bitnami
|
||||
name: postgresql
|
||||
38
master/durpapi/templates/deployment.yaml
Normal file
38
master/durpapi/templates/deployment.yaml
Normal file
@@ -0,0 +1,38 @@
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: {{ .Chart.Name }}
|
||||
labels:
|
||||
app: {{ .Chart.Name }}
|
||||
spec:
|
||||
revisionHistoryLimit: 1
|
||||
selector:
|
||||
matchLabels:
|
||||
app: {{ .Chart.Name }}
|
||||
replicas: {{ .Values.deployment.hpa.minReplicas }}
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app: {{ .Chart.Name }}
|
||||
spec:
|
||||
containers:
|
||||
- name: api
|
||||
image: "{{ .Values.deployment.image }}:{{ default .Chart.Version .Values.deployment.tag }}"
|
||||
imagePullPolicy: {{ .Values.deployment.imagePullPolicy }}
|
||||
readinessProbe:
|
||||
{{- toYaml .Values.deployment.probe.readiness | nindent 12 }}
|
||||
livenessProbe:
|
||||
{{- toYaml .Values.deployment.probe.liveness | nindent 12 }}
|
||||
startupProbe:
|
||||
{{- toYaml .Values.deployment.probe.startup | nindent 12 }}
|
||||
ports:
|
||||
- name: http
|
||||
containerPort: {{ .Values.service.targetport }}
|
||||
env:
|
||||
- name: host
|
||||
value: {{ .Values.swagger.host }}
|
||||
- name: version
|
||||
value: {{ default .Chart.Version .Values.deployment.tag }}
|
||||
envFrom:
|
||||
- secretRef:
|
||||
name: {{ .Values.deployment.secretfile }}
|
||||
24
master/durpapi/templates/hpa.yaml
Normal file
24
master/durpapi/templates/hpa.yaml
Normal file
@@ -0,0 +1,24 @@
|
||||
apiVersion: autoscaling/v2
|
||||
kind: HorizontalPodAutoscaler
|
||||
metadata:
|
||||
name: "{{ .Chart.Name }}-hpa"
|
||||
spec:
|
||||
scaleTargetRef:
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
name: {{ .Chart.Name }}
|
||||
minReplicas: {{ .Values.deployment.hpa.minReplicas }}
|
||||
maxReplicas: {{ .Values.deployment.hpa.maxReplicas }}
|
||||
metrics:
|
||||
- type: Resource
|
||||
resource:
|
||||
name: memory
|
||||
target:
|
||||
type: Utilization
|
||||
averageUtilization: 80
|
||||
- type: Resource
|
||||
resource:
|
||||
name: cpu
|
||||
target:
|
||||
type: Utilization
|
||||
averageUtilization: 40
|
||||
44
master/durpapi/templates/ingress.yaml
Normal file
44
master/durpapi/templates/ingress.yaml
Normal file
@@ -0,0 +1,44 @@
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: "{{ .Chart.Name }}-ingress"
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host("api.durp.info") && PathPrefix(`/api`)
|
||||
kind: Rule
|
||||
middlewares:
|
||||
- name: jwt
|
||||
services:
|
||||
- name: "durpapi-service"
|
||||
port: 80
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: "{{ .Chart.Name }}-swagger"
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host("api.durp.info") && PathPrefix(`/swagger`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: "durpapi-service"
|
||||
port: 80
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: jwt
|
||||
spec:
|
||||
plugin:
|
||||
jwt:
|
||||
Required: true
|
||||
Keys:
|
||||
- https://authentik.durp.info/application/o/api/jwks
|
||||
39
master/durpapi/templates/secrets.yaml
Normal file
39
master/durpapi/templates/secrets.yaml
Normal file
@@ -0,0 +1,39 @@
|
||||
apiVersion: external-secrets.io/v1beta1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: durpapi-secret
|
||||
spec:
|
||||
secretStoreRef:
|
||||
name: vault
|
||||
kind: ClusterSecretStore
|
||||
target:
|
||||
name: durpapi-secret
|
||||
data:
|
||||
- secretKey: db_host
|
||||
remoteRef:
|
||||
key: secrets/durpapi/postgres
|
||||
property: db_host
|
||||
- secretKey: db_port
|
||||
remoteRef:
|
||||
key: secrets/durpapi/postgres
|
||||
property: db_port
|
||||
- secretKey: db_pass
|
||||
remoteRef:
|
||||
key: secrets/durpapi/postgres
|
||||
property: db_pass
|
||||
- secretKey: db_user
|
||||
remoteRef:
|
||||
key: secrets/durpapi/postgres
|
||||
property: db_user
|
||||
- secretKey: db_sslmode
|
||||
remoteRef:
|
||||
key: secrets/durpapi/postgres
|
||||
property: db_sslmode
|
||||
- secretKey: db_name
|
||||
remoteRef:
|
||||
key: secrets/durpapi/postgres
|
||||
property: db_name
|
||||
- secretKey: llamaurl
|
||||
remoteRef:
|
||||
key: secrets/durpapi/llamaurl
|
||||
property: llamaurl
|
||||
12
master/durpapi/templates/service.yaml
Normal file
12
master/durpapi/templates/service.yaml
Normal file
@@ -0,0 +1,12 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: "{{ .Chart.Name }}-service"
|
||||
spec:
|
||||
ports:
|
||||
- name: http
|
||||
port: {{ .Values.service.port }}
|
||||
targetPort: {{ .Values.service.targetport }}
|
||||
protocol: TCP
|
||||
selector:
|
||||
app: {{ .Chart.Name }}
|
||||
39
master/durpapi/values.yaml
Normal file
39
master/durpapi/values.yaml
Normal file
@@ -0,0 +1,39 @@
|
||||
ingress:
|
||||
enabled: false
|
||||
deployment:
|
||||
image: registry.internal.durp.info/developerdurp/durpapi
|
||||
secretfile: durpapi-secret
|
||||
imagePullPolicy: Always
|
||||
hpa:
|
||||
minReplicas: 3
|
||||
maxReplicas: 10
|
||||
probe:
|
||||
readiness:
|
||||
httpGet:
|
||||
path: /health/gethealth
|
||||
port: 8080
|
||||
liveness:
|
||||
httpGet:
|
||||
path: /health/gethealth
|
||||
port: 8080
|
||||
startup:
|
||||
httpGet:
|
||||
path: /health/gethealth
|
||||
port: 8080
|
||||
service:
|
||||
type: ClusterIP
|
||||
port: 80
|
||||
targetport: 8080
|
||||
|
||||
swagger:
|
||||
host: api.durp.info
|
||||
postgresql:
|
||||
enabled: true
|
||||
auth:
|
||||
existingSecret: durpapi-secret
|
||||
secretKeys:
|
||||
adminPasswordKey: db_pass
|
||||
userPasswordKey: db_pass
|
||||
replicationPasswordKey: db_pass
|
||||
database: postgres
|
||||
username: postgres
|
||||
11
master/durpot/Chart.yaml
Normal file
11
master/durpot/Chart.yaml
Normal file
@@ -0,0 +1,11 @@
|
||||
apiVersion: v2
|
||||
name: durpapi
|
||||
description: A Helm chart for Kubernetes
|
||||
type: application
|
||||
version: 0.0.1
|
||||
appVersion: 0.0.1
|
||||
|
||||
dependencies:
|
||||
- name: durpot
|
||||
repository: https://gitlab.com/api/v4/projects/45025485/packages/helm/stable
|
||||
version: 0.1.0-dev0038
|
||||
43
master/durpot/templates/secrets.yaml
Normal file
43
master/durpot/templates/secrets.yaml
Normal file
@@ -0,0 +1,43 @@
|
||||
apiVersion: external-secrets.io/v1beta1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: durpot-secert
|
||||
spec:
|
||||
secretStoreRef:
|
||||
name: vault
|
||||
kind: ClusterSecretStore
|
||||
target:
|
||||
name: durpot-secret
|
||||
data:
|
||||
- secretKey: OPENAI_API_KEY
|
||||
remoteRef:
|
||||
key: secrets/durpot/openai
|
||||
property: OPENAI_API_KEY
|
||||
- secretKey: BOTPREFIX
|
||||
remoteRef:
|
||||
key: secrets/durpot/discord
|
||||
property: BOTPREFIX
|
||||
- secretKey: ChannelID
|
||||
remoteRef:
|
||||
key: secrets/durpot/discord
|
||||
property: ChannelID
|
||||
- secretKey: TOKEN
|
||||
remoteRef:
|
||||
key: secrets/durpot/discord
|
||||
property: TOKEN
|
||||
- secretKey: ClientID
|
||||
remoteRef:
|
||||
key: secrets/durpot/auth
|
||||
property: ClientID
|
||||
- secretKey: Password
|
||||
remoteRef:
|
||||
key: secrets/durpot/auth
|
||||
property: Password
|
||||
- secretKey: TokenURL
|
||||
remoteRef:
|
||||
key: secrets/durpot/auth
|
||||
property: TokenURL
|
||||
- secretKey: Username
|
||||
remoteRef:
|
||||
key: secrets/durpot/auth
|
||||
property: Username
|
||||
@@ -9,4 +9,4 @@ appVersion: 0.0.1
|
||||
dependencies:
|
||||
- name: external-dns
|
||||
repository: https://charts.bitnami.com/bitnami
|
||||
version: 6.20.3
|
||||
version: 8.3.8
|
||||
@@ -4,10 +4,10 @@ external-dns:
|
||||
|
||||
image:
|
||||
pullPolicy: Always
|
||||
txtPrefix: "dmz-"
|
||||
|
||||
sources:
|
||||
- service
|
||||
|
||||
|
||||
provider: cloudflare
|
||||
cloudflare:
|
||||
secretName : "external-dns"
|
||||
@@ -8,5 +8,5 @@ appVersion: 0.0.1
|
||||
dependencies:
|
||||
- name: external-secrets
|
||||
repository: https://charts.external-secrets.io
|
||||
version: 0.8.1
|
||||
version: 0.10.4
|
||||
|
||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
||||
dependencies:
|
||||
- name: gatekeeper
|
||||
repository: https://open-policy-agent.github.io/gatekeeper/charts
|
||||
version: 3.14.0
|
||||
version: 3.17.1
|
||||
278
master/gatekeeper/values.yaml
Normal file
278
master/gatekeeper/values.yaml
Normal file
@@ -0,0 +1,278 @@
|
||||
#gatekeeper:
|
||||
# replicas: 3
|
||||
# revisionHistoryLimit: 10
|
||||
# auditInterval: 60
|
||||
# metricsBackends: ["prometheus"]
|
||||
# auditMatchKindOnly: false
|
||||
# constraintViolationsLimit: 20
|
||||
# auditFromCache: false
|
||||
# disableMutation: false
|
||||
# disableValidatingWebhook: false
|
||||
# validatingWebhookName: gatekeeper-validating-webhook-configuration
|
||||
# validatingWebhookTimeoutSeconds: 3
|
||||
# validatingWebhookFailurePolicy: Ignore
|
||||
# validatingWebhookAnnotations: {}
|
||||
# validatingWebhookExemptNamespacesLabels: {}
|
||||
# validatingWebhookObjectSelector: {}
|
||||
# validatingWebhookCheckIgnoreFailurePolicy: Fail
|
||||
# validatingWebhookCustomRules: {}
|
||||
# validatingWebhookURL: null
|
||||
# enableDeleteOperations: false
|
||||
# enableExternalData: true
|
||||
# enableGeneratorResourceExpansion: true
|
||||
# enableTLSHealthcheck: false
|
||||
# maxServingThreads: -1
|
||||
# mutatingWebhookName: gatekeeper-mutating-webhook-configuration
|
||||
# mutatingWebhookFailurePolicy: Ignore
|
||||
# mutatingWebhookReinvocationPolicy: Never
|
||||
# mutatingWebhookAnnotations: {}
|
||||
# mutatingWebhookExemptNamespacesLabels: {}
|
||||
# mutatingWebhookObjectSelector: {}
|
||||
# mutatingWebhookTimeoutSeconds: 1
|
||||
# mutatingWebhookCustomRules: {}
|
||||
# mutatingWebhookURL: null
|
||||
# mutationAnnotations: false
|
||||
# auditChunkSize: 500
|
||||
# logLevel: INFO
|
||||
# logDenies: false
|
||||
# logMutations: false
|
||||
# emitAdmissionEvents: false
|
||||
# emitAuditEvents: false
|
||||
# admissionEventsInvolvedNamespace: false
|
||||
# auditEventsInvolvedNamespace: false
|
||||
# resourceQuota: true
|
||||
# externaldataProviderResponseCacheTTL: 3m
|
||||
# image:
|
||||
# repository: openpolicyagent/gatekeeper
|
||||
# crdRepository: openpolicyagent/gatekeeper-crds
|
||||
# release: v3.15.0-beta.0
|
||||
# pullPolicy: Always
|
||||
# pullSecrets: []
|
||||
# preInstall:
|
||||
# crdRepository:
|
||||
# image:
|
||||
# repository: null
|
||||
# tag: v3.15.0-beta.0
|
||||
# postUpgrade:
|
||||
# labelNamespace:
|
||||
# enabled: false
|
||||
# image:
|
||||
# repository: openpolicyagent/gatekeeper-crds
|
||||
# tag: v3.15.0-beta.0
|
||||
# pullPolicy: IfNotPresent
|
||||
# pullSecrets: []
|
||||
# extraNamespaces: []
|
||||
# podSecurity: ["pod-security.kubernetes.io/audit=restricted",
|
||||
# "pod-security.kubernetes.io/audit-version=latest",
|
||||
# "pod-security.kubernetes.io/warn=restricted",
|
||||
# "pod-security.kubernetes.io/warn-version=latest",
|
||||
# "pod-security.kubernetes.io/enforce=restricted",
|
||||
# "pod-security.kubernetes.io/enforce-version=v1.24"]
|
||||
# extraAnnotations: {}
|
||||
# priorityClassName: ""
|
||||
# affinity: {}
|
||||
# tolerations: []
|
||||
# nodeSelector: {kubernetes.io/os: linux}
|
||||
# resources: {}
|
||||
# securityContext:
|
||||
# allowPrivilegeEscalation: false
|
||||
# capabilities:
|
||||
# drop:
|
||||
# - ALL
|
||||
# readOnlyRootFilesystem: true
|
||||
# runAsGroup: 999
|
||||
# runAsNonRoot: true
|
||||
# runAsUser: 1000
|
||||
# postInstall:
|
||||
# labelNamespace:
|
||||
# enabled: true
|
||||
# extraRules: []
|
||||
# image:
|
||||
# repository: openpolicyagent/gatekeeper-crds
|
||||
# tag: v3.15.0-beta.0
|
||||
# pullPolicy: IfNotPresent
|
||||
# pullSecrets: []
|
||||
# extraNamespaces: []
|
||||
# podSecurity: ["pod-security.kubernetes.io/audit=restricted",
|
||||
# "pod-security.kubernetes.io/audit-version=latest",
|
||||
# "pod-security.kubernetes.io/warn=restricted",
|
||||
# "pod-security.kubernetes.io/warn-version=latest",
|
||||
# "pod-security.kubernetes.io/enforce=restricted",
|
||||
# "pod-security.kubernetes.io/enforce-version=v1.24"]
|
||||
# extraAnnotations: {}
|
||||
# priorityClassName: ""
|
||||
# probeWebhook:
|
||||
# enabled: true
|
||||
# image:
|
||||
# repository: curlimages/curl
|
||||
# tag: 7.83.1
|
||||
# pullPolicy: IfNotPresent
|
||||
# pullSecrets: []
|
||||
# waitTimeout: 60
|
||||
# httpTimeout: 2
|
||||
# insecureHTTPS: false
|
||||
# priorityClassName: ""
|
||||
# affinity: {}
|
||||
# tolerations: []
|
||||
# nodeSelector: {kubernetes.io/os: linux}
|
||||
# securityContext:
|
||||
# allowPrivilegeEscalation: false
|
||||
# capabilities:
|
||||
# drop:
|
||||
# - ALL
|
||||
# readOnlyRootFilesystem: true
|
||||
# runAsGroup: 999
|
||||
# runAsNonRoot: true
|
||||
# runAsUser: 1000
|
||||
# preUninstall:
|
||||
# deleteWebhookConfigurations:
|
||||
# extraRules: []
|
||||
# enabled: false
|
||||
# image:
|
||||
# repository: openpolicyagent/gatekeeper-crds
|
||||
# tag: v3.15.0-beta.0
|
||||
# pullPolicy: IfNotPresent
|
||||
# pullSecrets: []
|
||||
# priorityClassName: ""
|
||||
# affinity: {}
|
||||
# tolerations: []
|
||||
# nodeSelector: {kubernetes.io/os: linux}
|
||||
# resources: {}
|
||||
# securityContext:
|
||||
# allowPrivilegeEscalation: false
|
||||
# capabilities:
|
||||
# drop:
|
||||
# - ALL
|
||||
# readOnlyRootFilesystem: true
|
||||
# runAsGroup: 999
|
||||
# runAsNonRoot: true
|
||||
# runAsUser: 1000
|
||||
# podAnnotations: {}
|
||||
# auditPodAnnotations: {}
|
||||
# podLabels: {}
|
||||
# podCountLimit: "100"
|
||||
# secretAnnotations: {}
|
||||
# enableRuntimeDefaultSeccompProfile: true
|
||||
# controllerManager:
|
||||
# exemptNamespaces: []
|
||||
# exemptNamespacePrefixes: []
|
||||
# hostNetwork: false
|
||||
# dnsPolicy: ClusterFirst
|
||||
# port: 8443
|
||||
# metricsPort: 8888
|
||||
# healthPort: 9090
|
||||
# readinessTimeout: 1
|
||||
# livenessTimeout: 1
|
||||
# priorityClassName: system-cluster-critical
|
||||
# disableCertRotation: false
|
||||
# tlsMinVersion: 1.3
|
||||
# clientCertName: ""
|
||||
# strategyType: RollingUpdate
|
||||
# affinity:
|
||||
# podAntiAffinity:
|
||||
# preferredDuringSchedulingIgnoredDuringExecution:
|
||||
# - podAffinityTerm:
|
||||
# labelSelector:
|
||||
# matchExpressions:
|
||||
# - key: gatekeeper.sh/operation
|
||||
# operator: In
|
||||
# values:
|
||||
# - webhook
|
||||
# topologyKey: kubernetes.io/hostname
|
||||
# weight: 100
|
||||
# topologySpreadConstraints: []
|
||||
# tolerations: []
|
||||
# nodeSelector: {kubernetes.io/os: linux}
|
||||
# resources:
|
||||
# limits:
|
||||
# memory: 512Mi
|
||||
# requests:
|
||||
# cpu: 100m
|
||||
# memory: 512Mi
|
||||
# securityContext:
|
||||
# allowPrivilegeEscalation: false
|
||||
# capabilities:
|
||||
# drop:
|
||||
# - ALL
|
||||
# readOnlyRootFilesystem: true
|
||||
# runAsGroup: 999
|
||||
# runAsNonRoot: true
|
||||
# runAsUser: 1000
|
||||
# podSecurityContext:
|
||||
# fsGroup: 999
|
||||
# supplementalGroups:
|
||||
# - 999
|
||||
# extraRules: []
|
||||
# networkPolicy:
|
||||
# enabled: false
|
||||
# ingress: { }
|
||||
# # - from:
|
||||
# # - ipBlock:
|
||||
# # cidr: 0.0.0.0/0
|
||||
# audit:
|
||||
# enablePubsub: false
|
||||
# connection: audit-connection
|
||||
# channel: audit-channel
|
||||
# hostNetwork: false
|
||||
# dnsPolicy: ClusterFirst
|
||||
# metricsPort: 8888
|
||||
# healthPort: 9090
|
||||
# readinessTimeout: 1
|
||||
# livenessTimeout: 1
|
||||
# priorityClassName: system-cluster-critical
|
||||
# disableCertRotation: false
|
||||
# affinity: {}
|
||||
# tolerations: []
|
||||
# nodeSelector: {kubernetes.io/os: linux}
|
||||
# resources:
|
||||
# limits:
|
||||
# memory: 512Mi
|
||||
# requests:
|
||||
# cpu: 100m
|
||||
# memory: 512Mi
|
||||
# securityContext:
|
||||
# allowPrivilegeEscalation: false
|
||||
# capabilities:
|
||||
# drop:
|
||||
# - ALL
|
||||
# readOnlyRootFilesystem: true
|
||||
# runAsGroup: 999
|
||||
# runAsNonRoot: true
|
||||
# runAsUser: 1000
|
||||
# podSecurityContext:
|
||||
# fsGroup: 999
|
||||
# supplementalGroups:
|
||||
# - 999
|
||||
# writeToRAMDisk: false
|
||||
# extraRules: []
|
||||
# crds:
|
||||
# affinity: {}
|
||||
# tolerations: []
|
||||
# nodeSelector: {kubernetes.io/os: linux}
|
||||
# resources: {}
|
||||
# securityContext:
|
||||
# allowPrivilegeEscalation: false
|
||||
# capabilities:
|
||||
# drop:
|
||||
# - ALL
|
||||
# readOnlyRootFilesystem: true
|
||||
# runAsGroup: 65532
|
||||
# runAsNonRoot: true
|
||||
# runAsUser: 65532
|
||||
# pdb:
|
||||
# controllerManager:
|
||||
# minAvailable: 1
|
||||
# service: {}
|
||||
# disabledBuiltins: ["{http.send}"]
|
||||
# psp:
|
||||
# enabled: true
|
||||
# upgradeCRDs:
|
||||
# enabled: true
|
||||
# extraRules: []
|
||||
# priorityClassName: ""
|
||||
# rbac:
|
||||
# create: true
|
||||
# externalCertInjection:
|
||||
# enabled: false
|
||||
# secretName: gatekeeper-webhook-server-cert
|
||||
#
|
||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
||||
dependencies:
|
||||
- name: gitlab-runner
|
||||
repository: https://charts.gitlab.io/
|
||||
version: 0.43.0
|
||||
version: 0.69.0
|
||||
4
master/gitlab-runner/Dockerfile
Normal file
4
master/gitlab-runner/Dockerfile
Normal file
@@ -0,0 +1,4 @@
|
||||
FROM ubuntu:latest
|
||||
LABEL authors="user"
|
||||
|
||||
ENTRYPOINT ["top", "-b"]
|
||||
11
master/heimdall/Chart.yaml
Normal file
11
master/heimdall/Chart.yaml
Normal file
@@ -0,0 +1,11 @@
|
||||
apiVersion: v2
|
||||
name: heimdall
|
||||
description: A Helm chart for Kubernetes
|
||||
type: application
|
||||
version: 0.0.1
|
||||
appVersion: 0.0.1
|
||||
|
||||
dependencies:
|
||||
- name: heimdall
|
||||
repository: https://djjudas21.github.io/charts/
|
||||
version: 8.5.4
|
||||
52
master/heimdall/templates/ingress.yaml
Normal file
52
master/heimdall/templates/ingress.yaml
Normal file
@@ -0,0 +1,52 @@
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
annotations:
|
||||
name: heimdall-ingress
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`heimdall.durp.info`) && PathPrefix(`/`)
|
||||
middlewares:
|
||||
- name: authentik-proxy-provider
|
||||
namespace: traefik
|
||||
kind: Rule
|
||||
services:
|
||||
- name: heimdall
|
||||
port: 80
|
||||
- match: Host(`heimdall.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: ak-outpost-authentik-embedded-outpost
|
||||
namespace: authentik
|
||||
port: 9000
|
||||
tls:
|
||||
secretName: heimdall-tls
|
||||
|
||||
---
|
||||
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: heimdall-tls
|
||||
spec:
|
||||
secretName: heimdall-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "heimdall.durp.info"
|
||||
dnsNames:
|
||||
- "heimdall.durp.info"
|
||||
|
||||
---
|
||||
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: heimdall-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: heimdall.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: durp.info
|
||||
28
master/heimdall/values.yaml
Normal file
28
master/heimdall/values.yaml
Normal file
@@ -0,0 +1,28 @@
|
||||
heimdall:
|
||||
|
||||
image:
|
||||
registry:
|
||||
repository: registry.internal.durp.info/linuxserver/heimdall
|
||||
pullPolicy: Always
|
||||
|
||||
env:
|
||||
TZ: UTC
|
||||
PUID: "1000"
|
||||
PGID: "1000"
|
||||
|
||||
service:
|
||||
main:
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: heimdall.durp.info
|
||||
external-dns.alpha.kubernetes.io/target: home.durp.info
|
||||
ports:
|
||||
http:
|
||||
port: 80
|
||||
|
||||
ingress:
|
||||
main:
|
||||
enabled: false
|
||||
|
||||
persistence:
|
||||
config:
|
||||
enabled: true
|
||||
46
master/internalproxy/templates/argocd.yaml
Normal file
46
master/internalproxy/templates/argocd.yaml
Normal file
@@ -0,0 +1,46 @@
|
||||
#apiVersion: traefik.io/v1alpha1
|
||||
#kind: IngressRoute
|
||||
#metadata:
|
||||
# name: argocd-ingress
|
||||
# annotations:
|
||||
# cert-manager.io/cluster-issuer: letsencrypt-production
|
||||
#spec:
|
||||
# entryPoints:
|
||||
# - websecure
|
||||
# routes:
|
||||
# - match: Host(`argocd.internal.durp.info`)
|
||||
# middlewares:
|
||||
# - name: whitelist
|
||||
# namespace: traefik
|
||||
# kind: Rule
|
||||
# services:
|
||||
# - name: argocd-server
|
||||
# port: 443
|
||||
# scheme: https
|
||||
# tls:
|
||||
# secretName: argocd-tls
|
||||
#
|
||||
#---
|
||||
#
|
||||
#kind: Service
|
||||
#apiVersion: v1
|
||||
#metadata:
|
||||
# name: argocd-server
|
||||
#spec:
|
||||
# type: ExternalName
|
||||
# externalName: argocd-server.argocd.svc.cluster.local
|
||||
#
|
||||
#---
|
||||
#
|
||||
#apiVersion: cert-manager.io/v1
|
||||
#kind: Certificate
|
||||
#metadata:
|
||||
# name: argocd-tls
|
||||
#spec:
|
||||
# secretName: argocd-tls
|
||||
# issuerRef:
|
||||
# name: letsencrypt-production
|
||||
# kind: ClusterIssuer
|
||||
# commonName: "argocd.internal.durp.info"
|
||||
# dnsNames:
|
||||
# - "argocd.internal.durp.info"
|
||||
63
master/internalproxy/templates/blueiris.yaml
Normal file
63
master/internalproxy/templates/blueiris.yaml
Normal file
@@ -0,0 +1,63 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: blueiris
|
||||
spec:
|
||||
ports:
|
||||
- name: app
|
||||
port: 81
|
||||
protocol: TCP
|
||||
targetPort: 81
|
||||
clusterIP: None
|
||||
type: ClusterIP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Endpoints
|
||||
metadata:
|
||||
name: blueiris
|
||||
subsets:
|
||||
- addresses:
|
||||
- ip: 192.168.99.2
|
||||
ports:
|
||||
- name: app
|
||||
port: 81
|
||||
protocol: TCP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: blueiris-ingress
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`blueiris.internal.durp.info`) && PathPrefix(`/`)
|
||||
middlewares:
|
||||
- name: whitelist
|
||||
namespace: traefik
|
||||
kind: Rule
|
||||
services:
|
||||
- name: blueiris
|
||||
port: 81
|
||||
scheme: http
|
||||
tls:
|
||||
secretName: blueiris-tls
|
||||
|
||||
---
|
||||
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: blueiris-tls
|
||||
spec:
|
||||
secretName: blueiris-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "blueiris.internal.durp.info"
|
||||
dnsNames:
|
||||
- "blueiris.internal.durp.info"
|
||||
72
master/internalproxy/templates/gitea.yaml
Normal file
72
master/internalproxy/templates/gitea.yaml
Normal file
@@ -0,0 +1,72 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: gitea
|
||||
spec:
|
||||
ports:
|
||||
- name: app
|
||||
port: 3000
|
||||
protocol: TCP
|
||||
targetPort: 3000
|
||||
clusterIP: None
|
||||
type: ClusterIP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Endpoints
|
||||
metadata:
|
||||
name: gitea
|
||||
subsets:
|
||||
- addresses:
|
||||
- ip: 192.168.20.253
|
||||
ports:
|
||||
- name: app
|
||||
port: 3000
|
||||
protocol: TCP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: gitea-ingress
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`gitea.durp.info`) && PathPrefix(`/`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: gitea
|
||||
port: 3000
|
||||
scheme: http
|
||||
tls:
|
||||
secretName: gitea-tls
|
||||
|
||||
---
|
||||
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: gitea-tls
|
||||
spec:
|
||||
secretName: gitea-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "gitea.durp.info"
|
||||
dnsNames:
|
||||
- "gitea.durp.info"
|
||||
|
||||
---
|
||||
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: gitea-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: gitea.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: durp.info
|
||||
72
master/internalproxy/templates/jellyfin.yaml
Normal file
72
master/internalproxy/templates/jellyfin.yaml
Normal file
@@ -0,0 +1,72 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: jellyfin
|
||||
spec:
|
||||
ports:
|
||||
- name: app
|
||||
port: 8096
|
||||
protocol: TCP
|
||||
targetPort: 8096
|
||||
clusterIP: None
|
||||
type: ClusterIP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Endpoints
|
||||
metadata:
|
||||
name: jellyfin
|
||||
subsets:
|
||||
- addresses:
|
||||
- ip: 192.168.20.253
|
||||
ports:
|
||||
- name: app
|
||||
port: 8096
|
||||
protocol: TCP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: jellyfin-ingress
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`jellyfin.durp.info`) && PathPrefix(`/`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: jellyfin
|
||||
port: 8096
|
||||
scheme: http
|
||||
tls:
|
||||
secretName: jellyfin-tls
|
||||
|
||||
---
|
||||
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: jellyfin-tls
|
||||
spec:
|
||||
secretName: jellyfin-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "jellyfin.durp.info"
|
||||
dnsNames:
|
||||
- "jellyfin.durp.info"
|
||||
|
||||
---
|
||||
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: jellyfin-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: jellyfin.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: durp.info
|
||||
72
master/internalproxy/templates/kasm.yaml
Normal file
72
master/internalproxy/templates/kasm.yaml
Normal file
@@ -0,0 +1,72 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: kasm
|
||||
spec:
|
||||
ports:
|
||||
- name: app
|
||||
port: 443
|
||||
protocol: TCP
|
||||
targetPort: 443
|
||||
clusterIP: None
|
||||
type: ClusterIP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Endpoints
|
||||
metadata:
|
||||
name: kasm
|
||||
subsets:
|
||||
- addresses:
|
||||
- ip: 192.168.20.104
|
||||
ports:
|
||||
- name: app
|
||||
port: 443
|
||||
protocol: TCP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: kasm-ingress
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`kasm.durp.info`) && PathPrefix(`/`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: kasm
|
||||
port: 443
|
||||
scheme: https
|
||||
tls:
|
||||
secretName: kasm-tls
|
||||
|
||||
---
|
||||
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: kasm-tls
|
||||
spec:
|
||||
secretName: kasm-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "kasm.durp.info"
|
||||
dnsNames:
|
||||
- "kasm.durp.info"
|
||||
|
||||
---
|
||||
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: kasm-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: kasm.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: durp.info
|
||||
63
master/internalproxy/templates/minio.yaml
Normal file
63
master/internalproxy/templates/minio.yaml
Normal file
@@ -0,0 +1,63 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: minio
|
||||
spec:
|
||||
ports:
|
||||
- name: app
|
||||
port: 9769
|
||||
protocol: TCP
|
||||
targetPort: 9769
|
||||
clusterIP: None
|
||||
type: ClusterIP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Endpoints
|
||||
metadata:
|
||||
name: minio
|
||||
subsets:
|
||||
- addresses:
|
||||
- ip: 192.168.20.253
|
||||
ports:
|
||||
- name: app
|
||||
port: 9769
|
||||
protocol: TCP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: minio-ingress
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`minio.internal.durp.info`) && PathPrefix(`/`)
|
||||
middlewares:
|
||||
- name: whitelist
|
||||
namespace: traefik
|
||||
kind: Rule
|
||||
services:
|
||||
- name: minio
|
||||
port: 9769
|
||||
scheme: http
|
||||
tls:
|
||||
secretName: minio-tls
|
||||
|
||||
---
|
||||
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: minio-tls
|
||||
spec:
|
||||
secretName: minio-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "minio.internal.durp.info"
|
||||
dnsNames:
|
||||
- "minio.internal.durp.info"
|
||||
63
master/internalproxy/templates/octopus.yaml
Normal file
63
master/internalproxy/templates/octopus.yaml
Normal file
@@ -0,0 +1,63 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: octopus
|
||||
spec:
|
||||
ports:
|
||||
- name: app
|
||||
port: 443
|
||||
protocol: TCP
|
||||
targetPort: 443
|
||||
clusterIP: None
|
||||
type: ClusterIP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Endpoints
|
||||
metadata:
|
||||
name: octopus
|
||||
subsets:
|
||||
- addresses:
|
||||
- ip: 192.168.20.105
|
||||
ports:
|
||||
- name: app
|
||||
port: 443
|
||||
protocol: TCP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: octopus-ingress
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`octopus.internal.durp.info`) && PathPrefix(`/`)
|
||||
middlewares:
|
||||
- name: whitelist
|
||||
namespace: traefik
|
||||
kind: Rule
|
||||
services:
|
||||
- name: octopus
|
||||
port: 443
|
||||
scheme: https
|
||||
tls:
|
||||
secretName: octopus-tls
|
||||
|
||||
---
|
||||
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: octopus-tls
|
||||
spec:
|
||||
secretName: octopus-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "octopus.internal.durp.info"
|
||||
dnsNames:
|
||||
- "octopus.internal.durp.info"
|
||||
102
master/internalproxy/templates/ollama.yaml
Normal file
102
master/internalproxy/templates/ollama.yaml
Normal file
@@ -0,0 +1,102 @@
|
||||
apiVersion: external-secrets.io/v1beta1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: ollama-secret
|
||||
spec:
|
||||
secretStoreRef:
|
||||
name: vault
|
||||
kind: ClusterSecretStore
|
||||
target:
|
||||
name: ollama-secret
|
||||
data:
|
||||
- secretKey: users
|
||||
remoteRef:
|
||||
key: secrets/internalproxy/ollama
|
||||
property: users
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: ollama-basic-auth
|
||||
spec:
|
||||
basicAuth:
|
||||
headerField: x-api-key
|
||||
secret: ollama-secret
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: ollama
|
||||
spec:
|
||||
ports:
|
||||
- name: app
|
||||
port: 11435
|
||||
protocol: TCP
|
||||
targetPort: 11435
|
||||
clusterIP: None
|
||||
type: ClusterIP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Endpoints
|
||||
metadata:
|
||||
name: ollama
|
||||
subsets:
|
||||
- addresses:
|
||||
- ip: 192.168.20.104
|
||||
ports:
|
||||
- name: app
|
||||
port: 11435
|
||||
protocol: TCP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: ollama-ingress
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`ollama.durp.info`) && PathPrefix(`/`)
|
||||
middlewares:
|
||||
- name: ollama-basic-auth
|
||||
kind: Rule
|
||||
services:
|
||||
- name: ollama
|
||||
port: 11435
|
||||
tls:
|
||||
secretName: ollama-tls
|
||||
|
||||
---
|
||||
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: ollama-tls
|
||||
spec:
|
||||
secretName: ollama-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "ollama.durp.info"
|
||||
dnsNames:
|
||||
- "ollama.durp.info"
|
||||
|
||||
---
|
||||
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: ollama-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: ollama.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: durp.info
|
||||
63
master/internalproxy/templates/pfsense.yaml
Normal file
63
master/internalproxy/templates/pfsense.yaml
Normal file
@@ -0,0 +1,63 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: pfsense
|
||||
spec:
|
||||
ports:
|
||||
- name: app
|
||||
port: 10443
|
||||
protocol: TCP
|
||||
targetPort: 10443
|
||||
clusterIP: None
|
||||
type: ClusterIP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Endpoints
|
||||
metadata:
|
||||
name: pfsense
|
||||
subsets:
|
||||
- addresses:
|
||||
- ip: 192.168.20.1
|
||||
ports:
|
||||
- name: app
|
||||
port: 10443
|
||||
protocol: TCP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: pfsense-ingress
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`pfsense.internal.durp.info`) && PathPrefix(`/`)
|
||||
middlewares:
|
||||
- name: whitelist
|
||||
namespace: traefik
|
||||
kind: Rule
|
||||
services:
|
||||
- name: pfsense
|
||||
port: 10443
|
||||
scheme: https
|
||||
tls:
|
||||
secretName: pfsense-tls
|
||||
|
||||
---
|
||||
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: pfsense-tls
|
||||
spec:
|
||||
secretName: pfsense-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "pfsense.internal.durp.info"
|
||||
dnsNames:
|
||||
- "pfsense.internal.durp.info"
|
||||
72
master/internalproxy/templates/plex.yaml
Normal file
72
master/internalproxy/templates/plex.yaml
Normal file
@@ -0,0 +1,72 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: plex
|
||||
spec:
|
||||
ports:
|
||||
- name: app
|
||||
port: 32400
|
||||
protocol: TCP
|
||||
targetPort: 32400
|
||||
clusterIP: None
|
||||
type: ClusterIP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: v1
|
||||
kind: Endpoints
|
||||
metadata:
|
||||
name: plex
|
||||
subsets:
|
||||
- addresses:
|
||||
- ip: 192.168.20.253
|
||||
ports:
|
||||
- name: app
|
||||
port: 32400
|
||||
protocol: TCP
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
kind: IngressRoute
|
||||
metadata:
|
||||
name: plex-ingress
|
||||
spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`plex.durp.info`) && PathPrefix(`/`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: plex
|
||||
port: 32400
|
||||
scheme: https
|
||||
tls:
|
||||
secretName: plex-tls
|
||||
|
||||
---
|
||||
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: plex-tls
|
||||
spec:
|
||||
secretName: plex-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "plex.durp.info"
|
||||
dnsNames:
|
||||
- "plex.durp.info"
|
||||
|
||||
---
|
||||
|
||||
kind: Service
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: plex-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: plex.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: durp.info
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user