241 Commits

Author SHA1 Message Date
3e4a682e7b update 2025-02-12 15:17:37 -06:00
a66cdf40e3 update 2025-02-12 06:14:46 -06:00
6cd37b4bd0 update 2025-02-12 06:08:45 -06:00
c91fe325af update 2025-02-12 06:06:04 -06:00
848096364f update 2025-02-12 06:05:11 -06:00
a891c0ab20 update 2025-02-12 06:04:20 -06:00
2f202e9993 update 2025-02-12 05:52:17 -06:00
fad26e6e13 update 2025-02-12 05:43:28 -06:00
7a56cca0ee update 2025-02-12 05:41:26 -06:00
b05b5345ed update 2025-02-12 05:37:44 -06:00
b94d180811 update 2025-02-12 05:36:32 -06:00
80316602d5 update 2025-02-12 05:35:18 -06:00
4a0b91f737 update 2025-02-12 05:27:59 -06:00
bd45075112 update 2025-02-12 05:18:31 -06:00
664bd5b324 update 2025-02-12 05:13:12 -06:00
7d6c60117a update 2025-02-12 05:07:41 -06:00
fa66a33b41 update 2025-02-12 05:02:31 -06:00
fa6ca7c7b1 update 2025-02-12 04:57:45 -06:00
d550eba84d update 2025-02-11 04:46:05 -06:00
5d5fbd7fac update 2025-02-11 04:45:24 -06:00
9003f7f475 update 2025-02-11 04:43:51 -06:00
1641178875 update 2025-02-10 13:24:29 -06:00
03befcb0f8 update 2025-02-09 07:40:44 -06:00
1019a69c77 update 2025-02-09 06:48:31 -06:00
aabd349d60 update 2025-02-09 06:47:35 -06:00
786c034ef6 update 2025-02-09 06:46:19 -06:00
435533502b update 2025-02-09 06:44:29 -06:00
4f74f8d575 update 2025-02-09 06:26:53 -06:00
5ad335cc1e update 2025-02-09 06:22:07 -06:00
a6f6f38769 update 2025-02-09 06:18:31 -06:00
23edb4e2cc update 2025-02-09 06:14:44 -06:00
7f774c7dbd update 2025-02-09 06:14:04 -06:00
f3d914e308 update 2025-02-08 19:26:49 -06:00
14da96a2a9 update 2025-02-08 19:03:58 -06:00
f87e727b40 update 2025-02-08 19:02:07 -06:00
31437ce7bf update 2025-02-03 06:01:54 -06:00
6830296715 update 2025-02-03 06:01:01 -06:00
0ee046914a update 2025-02-03 06:00:28 -06:00
27cadcf8ce update 2025-02-03 05:56:30 -06:00
60c66fa3f3 update 2025-02-03 05:39:59 -06:00
f7f3719a74 update 2025-02-03 05:37:44 -06:00
0642f11a1a update 2025-02-03 05:36:54 -06:00
5a0a17b33f update 2025-01-28 05:51:49 -06:00
e4a429d720 update 2025-01-28 05:46:04 -06:00
2fda03d34e update 2025-01-28 04:54:07 -06:00
64396cd6e0 update 2025-01-28 04:49:28 -06:00
8eb26560e0 update 2025-01-27 05:53:46 -06:00
13e648043e update 2025-01-27 05:52:46 -06:00
d48a2c406e update 2025-01-27 05:49:49 -06:00
32bb9882e2 update 2025-01-27 05:49:38 -06:00
080cd1b3c1 update 2025-01-27 05:48:19 -06:00
d69480189b update 2025-01-27 05:45:44 -06:00
4483c0a657 update 2025-01-27 05:44:50 -06:00
edbfe65ce1 update 2025-01-27 05:43:10 -06:00
7cae2987a4 update 2025-01-27 05:40:07 -06:00
f885ed4329 update 2025-01-27 05:33:07 -06:00
d8ea4a907f update 2025-01-27 05:28:59 -06:00
ad18535ce7 update 2025-01-27 05:27:14 -06:00
f978937455 update 2025-01-27 05:26:32 -06:00
142254c94a update 2025-01-27 05:16:19 -06:00
81ed14c3ee update 2025-01-27 05:14:13 -06:00
950d5f7950 update 2025-01-27 05:12:47 -06:00
23356d2d3e update 2025-01-27 05:05:59 -06:00
2de99e6812 update 2025-01-27 04:55:55 -06:00
058d4c943f update 2025-01-24 05:33:05 -06:00
7a3567144f update 2025-01-24 05:28:37 -06:00
9276abe7cc update 2025-01-24 05:06:33 -06:00
c5077c097d update 2025-01-24 04:56:01 -06:00
cdd9419cff update 2025-01-23 15:36:53 -06:00
f1333aa0ee update 2025-01-23 15:36:31 -06:00
f9096df658 update 2025-01-23 06:05:24 -06:00
09d140bb64 update 2025-01-23 05:56:26 -06:00
91001c230e update 2025-01-23 05:55:55 -06:00
4087eb7aaf update 2025-01-23 05:13:24 -06:00
37640bd420 update 2025-01-22 06:26:29 -06:00
7588fa3279 update 2025-01-22 06:23:42 -06:00
08ca20b874 update 2025-01-22 06:22:56 -06:00
547ef2ffbc update 2025-01-22 06:21:04 -06:00
b4f701c084 update 2025-01-22 06:12:57 -06:00
a47fe24d51 update 2025-01-22 05:43:12 -06:00
881de48183 move back to HA 2025-01-22 05:42:15 -06:00
61eb2cb68e update 2025-01-22 05:41:34 -06:00
e17ffa9f3f update 2025-01-22 05:40:34 -06:00
b50e31d42d update 2025-01-22 05:39:28 -06:00
622114aace update 2025-01-22 05:38:10 -06:00
2c8321d9b1 update 2025-01-21 05:51:57 -06:00
985a291936 update 2025-01-21 05:42:08 -06:00
1490ef6c5e update 2025-01-21 05:40:38 -06:00
b45a04349e update 2025-01-21 05:36:24 -06:00
685dcde9c3 update 2025-01-21 05:12:47 -06:00
d18d64f0eb update 2025-01-21 05:02:56 -06:00
c3110978c7 update 2025-01-21 05:01:41 -06:00
03d69a40a0 update 2025-01-21 05:00:25 -06:00
a398e63650 update 2025-01-21 04:58:11 -06:00
5acce59cd1 update 2025-01-20 05:03:31 -06:00
9899459652 update 2025-01-20 05:01:13 -06:00
1c4624104a update 2025-01-19 13:51:52 -06:00
709def73de update 2025-01-19 13:25:12 -06:00
f0fd21ec86 update 2025-01-19 13:15:32 -06:00
7a6313f716 update 2025-01-19 13:12:27 -06:00
7dc22c2051 update 2025-01-19 13:10:58 -06:00
b3c020d810 update 2025-01-19 09:33:00 -06:00
ba19811491 update 2025-01-19 09:26:11 -06:00
c956f88f43 update 2025-01-19 09:07:29 -06:00
8e65ceca52 update 2025-01-19 09:03:53 -06:00
535a47a8f2 update 2025-01-19 08:53:43 -06:00
a9789b1221 update 2025-01-19 08:51:53 -06:00
87dd7d3da0 update 2025-01-19 08:47:39 -06:00
82ad8815f2 update 2025-01-16 06:00:29 -06:00
5089d01c06 update 2025-01-16 05:59:15 -06:00
f8f5f27cb0 add ingress 2025-01-16 05:55:52 -06:00
4c2e87944c update cert 2025-01-16 05:33:47 -06:00
b6fa1079b6 update 2025-01-15 06:15:44 -06:00
f5ceac3ec1 add vault 2025-01-15 06:00:30 -06:00
1966f141dc update config 2025-01-15 05:47:05 -06:00
f8d0229580 add metallb 2025-01-15 05:46:40 -06:00
e36610cd49 update 2025-01-15 05:42:45 -06:00
0c27dd360c add traefik to infra 2025-01-15 05:41:59 -06:00
user
e7c28dde45 update 2025-01-15 05:18:13 -06:00
user
41cc7889af ujpdate 2025-01-15 05:15:41 -06:00
user
f8899caf78 update 2025-01-15 05:12:37 -06:00
user
b47edf477b Add infra 2025-01-15 04:50:13 -06:00
54a82177f2 Update file deployment.yaml 2025-01-14 21:43:53 +00:00
f3684f197c Update file values.yaml 2025-01-11 14:41:37 +00:00
5f693d0020 Update file values.yaml 2025-01-11 14:40:35 +00:00
14a659df5b Update file values.yaml 2025-01-11 14:30:36 +00:00
46724e763c Update file s3.yaml 2025-01-11 14:27:01 +00:00
33c5d25271 remove top level files 2025-01-07 04:45:49 -06:00
99006a8900 Update folder location 2025-01-06 05:18:54 -06:00
a42b3e785d Update folder location 2025-01-06 05:14:52 -06:00
c39f20e371 Update folder location 2025-01-06 05:01:00 -06:00
dc324a2d8b Update whitelist 2025-01-04 07:17:43 -06:00
2d4d3773b7 Update ollama 2024-12-19 05:00:42 -06:00
54e12aa8c1 Update ollama auth 2024-12-15 08:04:32 -06:00
47d4e5015e Update ollama auth 2024-12-15 08:01:14 -06:00
e60030016e Update file ollama.yaml 2024-12-13 10:52:57 +00:00
6645dd77f6 update IP range 2024-11-17 10:24:23 -06:00
f1f8a9e837 update IP range 2024-11-17 10:14:22 -06:00
47214c5a93 Update file values.yaml 2024-10-15 11:12:18 +00:00
a1b05d6f8a Update chart version 2024-09-30 04:47:53 -05:00
8ca00e2715 Update chart version 2024-09-30 04:45:20 -05:00
7cbe7932f1 Update chart version 2024-09-30 04:41:20 -05:00
97d73b36c4 Update chart version 2024-09-29 08:56:15 -05:00
679742ab45 Update chart version 2024-09-29 08:55:44 -05:00
9b1680cfc8 Update chart version 2024-09-29 08:54:11 -05:00
dd3ca7c9a4 Update chart version 2024-09-29 08:51:08 -05:00
4a67df78b3 Update chart version 2024-09-29 08:45:48 -05:00
dde4eac238 Update chart version 2024-09-29 08:43:25 -05:00
f9987ac705 Update chart version 2024-09-29 08:43:01 -05:00
6705352a10 Update chart version 2024-09-29 08:41:06 -05:00
599e86e1a9 Update chart version 2024-09-29 08:37:42 -05:00
4826c5beb6 Update chart version 2024-09-29 08:33:29 -05:00
1284e2ec60 Update chart version 2024-09-29 08:28:14 -05:00
7f6e182084 Update chart version 2024-09-29 07:50:40 -05:00
a565952e0c Update chart version 2024-09-29 07:48:50 -05:00
f64bdfbedd Update chart version 2024-09-29 07:39:11 -05:00
e6a8aa74b4 Update chart version 2024-09-29 07:34:52 -05:00
b1c45f939b Update chart version 2024-09-29 07:29:39 -05:00
3bfec1450f Update chart version 2024-09-29 07:23:46 -05:00
d5224c0c7f Update chart version 2024-09-29 07:20:05 -05:00
4e37bfb8dc Update chart version 2024-09-29 07:13:09 -05:00
45ae3523b9 Update chart version 2024-09-29 06:43:58 -05:00
1151680f65 Update chart version 2024-09-29 06:42:16 -05:00
1aefb8163b Update chart version 2024-09-29 06:39:44 -05:00
e935822058 Update chart version 2024-09-29 06:35:39 -05:00
49b23b1788 Update chart version 2024-09-29 06:22:50 -05:00
bd2def6d46 Update chart version 2024-09-29 06:18:47 -05:00
10fcd43274 Update chart version 2024-09-13 06:23:48 -05:00
126c6e6f45 Update chart version 2024-09-13 06:20:00 -05:00
10ce90a460 Update chart version 2024-09-13 06:17:56 -05:00
c3cd2c0b8b Update chart version 2024-09-13 06:14:44 -05:00
8b74b2efb6 Update chart version 2024-09-13 06:10:15 -05:00
eecf949f86 Update worker count 2024-09-10 04:48:15 -05:00
2b951b2814 update authentik version 2024-09-10 04:43:57 -05:00
a1293abaf6 update 2024-08-31 07:40:14 -05:00
5781c6ddda update 2024-08-31 07:23:47 -05:00
42fc48bb27 update 2024-08-31 07:22:25 -05:00
0f908a1460 update 2024-08-31 07:19:33 -05:00
1febc6915e update 2024-08-31 07:14:08 -05:00
a99e0649dd update 2024-08-31 07:11:20 -05:00
d28f17120b upupdate 2024-08-30 05:08:33 -05:00
44d099ad9e update 2024-08-30 05:04:57 -05:00
5c866c2eb7 update 2024-08-30 05:04:25 -05:00
216cece298 update 2024-08-30 05:03:40 -05:00
f16da3d3a8 update resources 2024-08-30 04:58:02 -05:00
f12b7aa532 update resource 2024-08-30 04:56:01 -05:00
8ec254f59c enable autoscaller 2024-08-30 04:52:29 -05:00
33fd621ec8 add resource limits 2024-08-30 04:51:35 -05:00
89b8364fe5 add resource limits 2024-08-30 04:49:03 -05:00
52038a7585 update 2024-08-29 05:04:25 -05:00
885ab5e3d7 update 2024-08-29 05:02:08 -05:00
7843ae7c29 update 2024-08-29 04:57:40 -05:00
e2d1e01708 update 2024-08-29 04:55:28 -05:00
e8cafed885 update 2024-08-29 04:50:55 -05:00
62b7efad89 update 2024-08-27 04:58:07 -05:00
47ddf2fd28 update 2024-08-25 06:32:15 -05:00
31b689d5fe update 2024-08-25 06:28:15 -05:00
5ef03e6dbe update 2024-08-25 06:27:05 -05:00
38bb3538a3 update 2024-08-25 06:22:33 -05:00
8c77e53669 update 2024-08-25 06:20:12 -05:00
44aac27362 update 2024-08-25 06:19:34 -05:00
0f4048072d update 2024-08-25 06:11:13 -05:00
b6f0c41d5d update 2024-08-25 06:09:41 -05:00
3259cd6f37 update 2024-08-25 06:07:19 -05:00
418162a9e0 update 2024-08-25 05:43:48 -05:00
de022ea46b update 2024-08-25 05:33:43 -05:00
a50214eafc update 2024-08-25 05:32:20 -05:00
be2ee6274a update 2024-08-25 05:12:54 -05:00
1fbe3dbc95 update 2024-08-25 05:08:59 -05:00
f8a13c4bff update 2024-08-25 05:05:59 -05:00
c9d77c5eec update 2024-08-25 05:03:23 -05:00
3457eba0a2 update 2024-08-25 04:52:22 -05:00
738d19edfa update 2024-08-25 04:40:58 -05:00
23d397e5d4 update 2024-08-25 04:35:16 -05:00
10bfb6fd54 update 2024-08-25 04:34:31 -05:00
0ff6377bd6 update 2024-08-24 21:30:35 -05:00
8d92151ad3 update 2024-08-24 21:29:00 -05:00
3f74860c28 update 2024-08-24 21:28:14 -05:00
f12af0f92f update 2024-08-24 21:28:03 -05:00
86a5af321d update 2024-08-24 21:25:12 -05:00
4a1e4f980d update 2024-08-24 21:23:10 -05:00
bf6c021d8b update 2024-08-24 21:09:10 -05:00
0abc90d9cd update 2024-08-24 21:08:06 -05:00
e2cabee7dd update 2024-08-24 20:57:18 -05:00
1f2fd56d89 update 2024-08-24 20:56:13 -05:00
785a256258 update 2024-08-24 20:47:17 -05:00
26c3a919c6 update 2024-08-24 20:33:10 -05:00
280298cc0a update 2024-08-24 20:31:37 -05:00
f5b4c58367 update 2024-08-24 20:30:21 -05:00
0a3f3d99d7 update 2024-08-24 20:29:32 -05:00
21405024f7 add pfsense 2024-08-24 20:23:35 -05:00
61110282d5 update 2024-08-11 07:57:18 -05:00
5765f9b5d7 revert 2024-08-11 07:50:53 -05:00
f70c55dcf2 update 2024-08-11 07:48:13 -05:00
b2212a6608 move to nfs 2024-08-11 07:47:05 -05:00
5e5a7b3803 update 2024-08-11 07:40:16 -05:00
b1272fc052 remove proxy 2024-08-04 07:25:42 -05:00
c2298c51b1 update 2024-07-21 08:54:15 -05:00
40e98020bb update 2024-07-21 08:47:10 -05:00
30331572e5 Update Chart 2024-05-29 02:21:27 +00:00
ef367a7d10 move branch to prd 2024-05-11 06:24:20 -05:00
188 changed files with 3116 additions and 482 deletions

1
.gitignore vendored Normal file
View File

@@ -0,0 +1 @@
.idea

View File

@@ -0,0 +1,101 @@
apiVersion: external-secrets.io/v1beta1
kind: ExternalSecret
metadata:
name: ollama-secret
spec:
secretStoreRef:
name: vault
kind: ClusterSecretStore
target:
name: ollama-secret
data:
- secretKey: users
remoteRef:
key: secrets/internalproxy/ollama
property: users
---
apiVersion: traefik.containo.us/v1alpha1
kind: Middleware
metadata:
name: ollama-basic-auth
spec:
basicAuth:
secret: ollama-secret
---
apiVersion: v1
kind: Service
metadata:
name: ollama
spec:
ports:
- name: app
port: 11435
protocol: TCP
targetPort: 11435
clusterIP: None
type: ClusterIP
---
apiVersion: v1
kind: Endpoints
metadata:
name: ollama
subsets:
- addresses:
- ip: 192.168.20.104
ports:
- name: app
port: 11435
protocol: TCP
---
apiVersion: traefik.containo.us/v1alpha1
kind: IngressRoute
metadata:
name: ollama-ingress
spec:
entryPoints:
- websecure
routes:
- match: Host(`ollama.durp.info`) && PathPrefix(`/`)
middlewares:
- name: ollama-basic-auth
kind: Rule
services:
- name: ollama
port: 11435
tls:
secretName: ollama-tls
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: ollama-tls
spec:
secretName: ollama-tls
issuerRef:
name: letsencrypt-production
kind: ClusterIssuer
commonName: "ollama.durp.info"
dnsNames:
- "ollama.durp.info"
---
kind: Service
apiVersion: v1
metadata:
name: ollama-external-dns
annotations:
external-dns.alpha.kubernetes.io/hostname: ollama.durp.info
spec:
type: ExternalName
externalName: durp.info

View File

@@ -1,277 +0,0 @@
gatekeeper:
replicas: 3
revisionHistoryLimit: 10
auditInterval: 60
metricsBackends: ["prometheus"]
auditMatchKindOnly: false
constraintViolationsLimit: 20
auditFromCache: false
disableMutation: false
disableValidatingWebhook: false
validatingWebhookName: gatekeeper-validating-webhook-configuration
validatingWebhookTimeoutSeconds: 3
validatingWebhookFailurePolicy: Ignore
validatingWebhookAnnotations: {}
validatingWebhookExemptNamespacesLabels: {}
validatingWebhookObjectSelector: {}
validatingWebhookCheckIgnoreFailurePolicy: Fail
validatingWebhookCustomRules: {}
validatingWebhookURL: null
enableDeleteOperations: false
enableExternalData: true
enableGeneratorResourceExpansion: true
enableTLSHealthcheck: false
maxServingThreads: -1
mutatingWebhookName: gatekeeper-mutating-webhook-configuration
mutatingWebhookFailurePolicy: Ignore
mutatingWebhookReinvocationPolicy: Never
mutatingWebhookAnnotations: {}
mutatingWebhookExemptNamespacesLabels: {}
mutatingWebhookObjectSelector: {}
mutatingWebhookTimeoutSeconds: 1
mutatingWebhookCustomRules: {}
mutatingWebhookURL: null
mutationAnnotations: false
auditChunkSize: 500
logLevel: INFO
logDenies: false
logMutations: false
emitAdmissionEvents: false
emitAuditEvents: false
admissionEventsInvolvedNamespace: false
auditEventsInvolvedNamespace: false
resourceQuota: true
externaldataProviderResponseCacheTTL: 3m
image:
repository: openpolicyagent/gatekeeper
crdRepository: openpolicyagent/gatekeeper-crds
release: v3.15.0-beta.0
pullPolicy: Always
pullSecrets: []
preInstall:
crdRepository:
image:
repository: null
tag: v3.15.0-beta.0
postUpgrade:
labelNamespace:
enabled: false
image:
repository: openpolicyagent/gatekeeper-crds
tag: v3.15.0-beta.0
pullPolicy: IfNotPresent
pullSecrets: []
extraNamespaces: []
podSecurity: ["pod-security.kubernetes.io/audit=restricted",
"pod-security.kubernetes.io/audit-version=latest",
"pod-security.kubernetes.io/warn=restricted",
"pod-security.kubernetes.io/warn-version=latest",
"pod-security.kubernetes.io/enforce=restricted",
"pod-security.kubernetes.io/enforce-version=v1.24"]
extraAnnotations: {}
priorityClassName: ""
affinity: {}
tolerations: []
nodeSelector: {kubernetes.io/os: linux}
resources: {}
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
readOnlyRootFilesystem: true
runAsGroup: 999
runAsNonRoot: true
runAsUser: 1000
postInstall:
labelNamespace:
enabled: true
extraRules: []
image:
repository: openpolicyagent/gatekeeper-crds
tag: v3.15.0-beta.0
pullPolicy: IfNotPresent
pullSecrets: []
extraNamespaces: []
podSecurity: ["pod-security.kubernetes.io/audit=restricted",
"pod-security.kubernetes.io/audit-version=latest",
"pod-security.kubernetes.io/warn=restricted",
"pod-security.kubernetes.io/warn-version=latest",
"pod-security.kubernetes.io/enforce=restricted",
"pod-security.kubernetes.io/enforce-version=v1.24"]
extraAnnotations: {}
priorityClassName: ""
probeWebhook:
enabled: true
image:
repository: curlimages/curl
tag: 7.83.1
pullPolicy: IfNotPresent
pullSecrets: []
waitTimeout: 60
httpTimeout: 2
insecureHTTPS: false
priorityClassName: ""
affinity: {}
tolerations: []
nodeSelector: {kubernetes.io/os: linux}
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
readOnlyRootFilesystem: true
runAsGroup: 999
runAsNonRoot: true
runAsUser: 1000
preUninstall:
deleteWebhookConfigurations:
extraRules: []
enabled: false
image:
repository: openpolicyagent/gatekeeper-crds
tag: v3.15.0-beta.0
pullPolicy: IfNotPresent
pullSecrets: []
priorityClassName: ""
affinity: {}
tolerations: []
nodeSelector: {kubernetes.io/os: linux}
resources: {}
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
readOnlyRootFilesystem: true
runAsGroup: 999
runAsNonRoot: true
runAsUser: 1000
podAnnotations: {}
auditPodAnnotations: {}
podLabels: {}
podCountLimit: "100"
secretAnnotations: {}
enableRuntimeDefaultSeccompProfile: true
controllerManager:
exemptNamespaces: []
exemptNamespacePrefixes: []
hostNetwork: false
dnsPolicy: ClusterFirst
port: 8443
metricsPort: 8888
healthPort: 9090
readinessTimeout: 1
livenessTimeout: 1
priorityClassName: system-cluster-critical
disableCertRotation: false
tlsMinVersion: 1.3
clientCertName: ""
strategyType: RollingUpdate
affinity:
podAntiAffinity:
preferredDuringSchedulingIgnoredDuringExecution:
- podAffinityTerm:
labelSelector:
matchExpressions:
- key: gatekeeper.sh/operation
operator: In
values:
- webhook
topologyKey: kubernetes.io/hostname
weight: 100
topologySpreadConstraints: []
tolerations: []
nodeSelector: {kubernetes.io/os: linux}
resources:
limits:
memory: 512Mi
requests:
cpu: 100m
memory: 512Mi
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
readOnlyRootFilesystem: true
runAsGroup: 999
runAsNonRoot: true
runAsUser: 1000
podSecurityContext:
fsGroup: 999
supplementalGroups:
- 999
extraRules: []
networkPolicy:
enabled: false
ingress: { }
# - from:
# - ipBlock:
# cidr: 0.0.0.0/0
audit:
enablePubsub: false
connection: audit-connection
channel: audit-channel
hostNetwork: false
dnsPolicy: ClusterFirst
metricsPort: 8888
healthPort: 9090
readinessTimeout: 1
livenessTimeout: 1
priorityClassName: system-cluster-critical
disableCertRotation: false
affinity: {}
tolerations: []
nodeSelector: {kubernetes.io/os: linux}
resources:
limits:
memory: 512Mi
requests:
cpu: 100m
memory: 512Mi
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
readOnlyRootFilesystem: true
runAsGroup: 999
runAsNonRoot: true
runAsUser: 1000
podSecurityContext:
fsGroup: 999
supplementalGroups:
- 999
writeToRAMDisk: false
extraRules: []
crds:
affinity: {}
tolerations: []
nodeSelector: {kubernetes.io/os: linux}
resources: {}
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
readOnlyRootFilesystem: true
runAsGroup: 65532
runAsNonRoot: true
runAsUser: 65532
pdb:
controllerManager:
minAvailable: 1
service: {}
disabledBuiltins: ["{http.send}"]
psp:
enabled: true
upgradeCRDs:
enabled: true
extraRules: []
priorityClassName: ""
rbac:
create: true
externalCertInjection:
enabled: false
secretName: gatekeeper-webhook-server-cert

12
infra/argocd/Chart.yaml Normal file
View File

@@ -0,0 +1,12 @@
apiVersion: v2
name: argocd
description: A Helm chart for Kubernetes
type: application
version: 0.1.0
appVersion: "1.16.0"
dependencies:
- name: argo-cd
repository: https://argoproj.github.io/argo-helm
version: 6.11.1

View File

@@ -0,0 +1,79 @@
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: argocd
namespace: argocd
spec:
project: default
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: infra/argocd
destination:
namespace: argocd
name: in-cluster
syncPolicy:
automated:
prune: true
selfHeal: true
syncOptions:
- CreateNamespace=true
---
#apiVersion: external-secrets.io/v1beta1
#kind: ExternalSecret
#metadata:
# name: vault-argocd
# labels:
# app.kubernetes.io/part-of: argocd
#spec:
# secretStoreRef:
# name: vault
# kind: ClusterSecretStore
# target:
# name: client-secret
# data:
# - secretKey: clientSecret
# remoteRef:
# key: secrets/argocd/authentik
# property: clientsecret
---
apiVersion: traefik.io/v1alpha1
kind: IngressRoute
metadata:
name: argocd-ingress
annotations:
cert-manager.io/cluster-issuer: letsencrypt-production
spec:
entryPoints:
- websecure
routes:
- match: Host(`argocd.infra.durp.info`)
#middlewares:
# - name: whitelist
# namespace: traefik
kind: Rule
services:
- name: argocd-server
port: 443
scheme: https
tls:
secretName: argocd-tls
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: argocd-tls
spec:
secretName: argocd-tls
issuerRef:
name: letsencrypt-production
kind: ClusterIssuer
commonName: "argocd.infra.durp.info"
dnsNames:
- "argocd.infra.durp.info"

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: cert-manager
path: infra/cert-manager
destination:
namespace: cert-manager
name: in-cluster
@@ -18,3 +18,4 @@ spec:
selfHeal: true
syncOptions:
- CreateNamespace=true

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: external-secrets
path: infra/external-secrets
destination:
namespace: external-secrets
name: in-cluster
@@ -18,3 +18,4 @@ spec:
selfHeal: true
syncOptions:
- CreateNamespace=true

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: longhorn
path: infra/longhorn
destination:
namespace: longhorn-system
name: in-cluster

View File

@@ -0,0 +1,21 @@
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: metallb-system
namespace: argocd
spec:
project: default
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: infra/metallb-system
destination:
namespace: metallb-system
name: in-cluster
syncPolicy:
automated:
prune: true
selfHeal: true
syncOptions:
- CreateNamespace=true

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: traefik
path: infra/traefik
destination:
namespace: traefik
name: in-cluster
@@ -18,3 +18,4 @@ spec:
selfHeal: true
syncOptions:
- CreateNamespace=true

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: vault
path: infra/vault
destination:
namespace: vault
name: in-cluster

62
infra/argocd/values.yaml Normal file
View File

@@ -0,0 +1,62 @@
argo-cd:
global:
revisionHistoryLimit: 1
image:
repository: registry.internal.durp.info/argoproj/argocd
imagePullPolicy: Always
server:
#extraArgs:
# - --dex-server-plaintext
# - --dex-server=argocd-dex-server:5556
# oidc.config: |
# name: AzureAD
# issuer: https://login.microsoftonline.com/TENANT_ID/v2.0
# clientID: CLIENT_ID
# clientSecret: $oidc.azuread.clientSecret
# requestedIDTokenClaims:
# groups:
# essential: true
# requestedScopes:
# - openid
# - profile
# - email
dex:
enabled: true
image:
repository: registry.internal.durp.info/dexidp/dex
imagePullPolicy: Always
configs:
cm:
create: true
annotations: {}
url: https://argocd.internal.durp.info
oidc.tls.insecure.skip.verify: "true"
dex.config: |
connectors:
- config:
issuer: https://authentik.durp.info/application/o/argocd/
clientID: dbb8ffc06104fb6e7fac3e4ae7fafb1d90437625
clientSecret: $client-secret:clientSecret
insecureEnableGroups: true
scopes:
- openid
- profile
- email
- groups
name: authentik
type: oidc
id: authentik
rbac:
create: true
policy.csv: |
g, ArgoCD Admins, role:admin
scopes: "[groups]"
server:
route:
enabled: false

View File

@@ -8,4 +8,4 @@ appVersion: 0.0.1
dependencies:
- name: cert-manager
repository: https://charts.jetstack.io
version: 1.*.*
version: v1.16.3

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

View File

@@ -0,0 +1,23 @@
apiVersion: external-secrets.io/v1beta1
kind: ExternalSecret
metadata:
name: cloudflare-api-token-secret
spec:
secretStoreRef:
name: vault
kind: ClusterSecretStore
target:
name: cloudflare-api-token-secret
data:
- secretKey: cloudflare-api-token-secret
remoteRef:
key: kv/cert-manager
property: cloudflare-api-token-secret
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: vault

View File

@@ -0,0 +1,26 @@
cert-manager:
crds:
enabled: true
image:
registry: registry.internal.durp.info
repository: jetstack/cert-manager-controller
pullPolicy: Always
replicaCount: 3
#extraArgs:
# - --dns01-recursive-nameservers=1.1.1.1:53,1.0.0.1:53
# - --dns01-recursive-nameservers-only
#podDnsPolicy: None
#podDnsConfig:
# nameservers:
# - "1.1.1.1"
# - "1.0.0.1"
webhook:
image:
registry: registry.internal.durp.info
repository: jetstack/cert-manager-webhook
pullPolicy: Always
cainjector:
image:
registry: registry.internal.durp.info
repository: jetstack/cert-manager-cainjector
pullPolicy: Always

View File

@@ -0,0 +1,11 @@
apiVersion: v2
name: external-secrets
description: A Helm chart for Kubernetes
type: application
version: 0.0.1
appVersion: 0.0.1
dependencies:
- name: external-secrets
repository: https://charts.external-secrets.io
version: 0.13.0

View File

@@ -0,0 +1,81 @@
apiVersion: v1
data:
vault.pem: |
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIEmzCCA4OgAwIBAgIUQwCAs82sgSuiaVbjANHScO2DSfAwDQYJKoZIhvcNAQEL
BQAwFDESMBAGA1UEAxMJZHVycC5pbmZvMB4XDTI1MDEyMzExMjEyNVoXDTM1MDEy
MTExMTU1NVowFDESMBAGA1UEAxMJZHVycC5pbmZvMIIBIjANBgkqhkiG9w0BAQEF
AAOCAQ8AMIIBCgKCAQEAn9fjGRqqFsqguz56X6cXZwEMtD9wElwSFCb4Fc8YTzlH
4fV13QwXKESLE/Q+7bw4y4FJQ8BiGNbxxbQOOgWhfGGlQyFa1lfhJtYLfqRN5C2/
S7nr0YxDB9duc4OAExVL6Pr4/Koc+vDZY03l7RzwnF2AOM9DjFTASw01TphCQjRk
U+upiN2TUhUPejV/gMR+zXM6pn98UBKG1dNubS0HzAMwAEXAPm141NDyWUCPT9+3
6P03Ka8mUTx3X49OCtvJEGEQbtlnTFQaOSkP1yLW+XRMHw3sQaV2PWXu5fInbEpZ
+SuzmgLOXtmQNmHLav9q1qeTVkpBGPWvfh2Vh1JJhQIDAQABo4IB4zCCAd8wDgYD
VR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFJaP17f1Zw0V
55Ks9Uf0USVWl0BPMB8GA1UdIwQYMBaAFO1jCyGkpFO+QiR2dfBMWVYeWrQ2MIH0
BggrBgEFBQcBAQSB5zCB5DAzBggrBgEFBQcwAYYnaHR0cHM6Ly8xOTIuMTY4LjIw
LjI1Mzo4MjAxL3YxL3BraS9vY3NwMD0GCCsGAQUFBzABhjFodHRwczovL3Jvb3Qt
dmF1bHQuaW50ZXJuYWwuZHVycC5pbmZvL3YxL3BraS9vY3NwMDEGCCsGAQUFBzAC
hiVodHRwczovLzE5Mi4xNjguMjAuMjUzOjgyMDEvdjEvcGtpL2NhMDsGCCsGAQUF
BzAChi9odHRwczovL3Jvb3QtdmF1bHQuaW50ZXJuYWwuZHVycC5pbmZvL3YxL3Br
aS9jYTAUBgNVHREEDTALgglkdXJwLmluZm8wbwYDVR0fBGgwZjAsoCqgKIYmaHR0
cHM6Ly8xOTIuMTY4LjIwLjI1Mzo4MjAxL3YxL3BraS9jcmwwNqA0oDKGMGh0dHBz
Oi8vcm9vdC12YXVsdC5pbnRlcm5hbC5kdXJwLmluZm8vdjEvcGtpL2NybDANBgkq
hkiG9w0BAQsFAAOCAQEAiqAZ4zNIEkCWcvpDRq0VyJuk59sVtJr5X4FscHQ179nE
QbbvMe+EBDFS6XQml1Elj8jiPa/D5O9Oc6Iisnm5+weZKwApz/lQ+XVkWLCoEplB
ZZ9fcWVCbMLt0xlt8qn5z/mYKfbCT7ZCqDO+prQZt+ADJcQbiknfroAAqEbNKxwN
Y9uUyOWNF3SxJEch4w2dtX+IEVmxeZnhMy8OuP0SQKl8aW40ugiG0ZD5yTBBfOD9
zsrGSU/iSatn0b7bevBhaL96hz1/rNR1cL+4/albX2hrr8Rv3/SB2DLtNQlQW0ls
AfhXAqP5zL+Ytgf1Of/pVdgnhxrYUY7RKCSGY5Hagw==
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIDLzCCAhegAwIBAgIUNHdvOzam2HPVdwXpMHUy4wl8ZRYwDQYJKoZIhvcNAQEL
BQAwFDESMBAGA1UEAxMJZHVycC5pbmZvMB4XDTI1MDEyMzExMTUyNVoXDTM1MDEy
MTExMTU1NVowFDESMBAGA1UEAxMJZHVycC5pbmZvMIIBIjANBgkqhkiG9w0BAQEF
AAOCAQ8AMIIBCgKCAQEA8XDTVEtRI3+k4yuvqVqfIiLRQJcXbmhfVtAeYk+5j9Ox
p1w9YHdnPLqLFrD1PzadjqYeAp/fwlEFfs6lqwoTS8S9vhaFqcgB57nVMb77dTBb
/08XHXOU6FPRjdFKm5QMpS7tn1XacPMy/o0bKqRREQeiuFDGVRyuF5PUgvWc1dvJ
l27JvvgYktgjfpNS4DlCxg4lGXT5abvaKf2hnr65egaIo/yRWN9wnvAzRiY7oci7
GA1oKz87Yc1tfL2gcynrwccOOCF/eUKesJR1I6GXNkN/a1fcr+Ld9Z9NhHBtO+vE
N8DsZY+kG7DE3M4BCCTFUzllcYHjaW4HaF9vZW+PYwIDAQABo3kwdzAOBgNVHQ8B
Af8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU7WMLIaSkU75CJHZ1
8ExZVh5atDYwHwYDVR0jBBgwFoAU7WMLIaSkU75CJHZ18ExZVh5atDYwFAYDVR0R
BA0wC4IJZHVycC5pbmZvMA0GCSqGSIb3DQEBCwUAA4IBAQAS/qUI/1Yv07xUTK5k
r93kC7GSPpmpkXIsfjChAl93sebN143fu70NUP74jjCc0Wkb8hRofGg10E+/24r1
AI0KsLhzKzfIASxUVQAn8RTptLruaaPLboSA4MUZ8IB5y8Vy8E3/KtD0gD80j64Y
rm9XGHA0HTJHbPUTb/Rux2g0E7WtiyWSWH8mqzbegU8IrkM3eVT4+ylBE7YkfWDD
dw44sB71tfmDKpzWg6XQ6YMh0YfnyG1fYCj9LhuecNY9Uuo6cjDaAvkzMewWwqDx
Q2Ekas98Di6itCP8vET+gBDjeCc+XR6Hx6vzWmxlZhwDuxEKL1a2/DabUxJyMNzv
55Fn
-----END CERTIFICATE-----
kind: ConfigMap
metadata:
name: ca-pemstore

View File

@@ -0,0 +1,70 @@
external-secrets:
replicaCount: 3
revisionHistoryLimit: 1
leaderElect: true
installCRDs: true
crds:
createClusterExternalSecret: true
createClusterSecretStore: true
createClusterGenerator: true
createPushSecret: true
conversion:
enabled: false
image:
repository: registry.internal.durp.info/external-secrets/external-secrets
pullPolicy: Always
extraVolumes:
- name: ca-pemstore
configMap:
name: ca-pemstore
extraVolumeMounts:
- name: ca-pemstore
mountPath: /etc/ssl/certs/vault.pem
subPath: vault.pem
readOnly: true
resources:
requests:
memory: 32Mi
cpu: 10m
limits:
memory: 32Mi
cpu: 10m
webhook:
log:
level: debug
image:
repository: registry.internal.durp.info/external-secrets/external-secrets
pullPolicy: Always
resources:
requests:
memory: 32Mi
cpu: 10m
limits:
memory: 32Mi
cpu: 10m
certController:
create: false
revisionHistoryLimit: 1
log:
level: debug
image:
repository: registry.internal.durp.info/external-secrets/external-secrets
pullPolicy: Always
tag: ""
resources:
requests:
memory: 32Mi
cpu: 10m
limits:
memory: 32Mi
cpu: 10m

View File

@@ -9,4 +9,4 @@ appVersion: "1.16.0"
dependencies:
- name: longhorn
repository: https://charts.longhorn.io
version: 1.3.2
version: 1.7.2

View File

@@ -0,0 +1,32 @@
apiVersion: traefik.io/v1alpha1
kind: IngressRoute
metadata:
name: longhorn-ingress
annotations:
cert-manager.io/cluster-issuer: letsencrypt-production
spec:
entryPoints:
- websecure
routes:
- match: Host(`longhorn.infra.durp.info`) && PathPrefix(`/`)
kind: Rule
services:
- name: longhorn-frontend
port: 80
tls:
secretName: longhorn-tls1
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: longhorn-tls1
spec:
secretName: longhorn-tls1
issuerRef:
name: vault-issuer
kind: ClusterIssuer
commonName: "longhorn.infra.durp.info"
dnsNames:
- "longhorn.infra.durp.info"

View File

@@ -0,0 +1,30 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: vault
---
apiVersion: external-secrets.io/v1beta1
kind: ExternalSecret
metadata:
name: external-longhorn-backup-token-secret
spec:
secretStoreRef:
name: vault
kind: ClusterSecretStore
target:
name: longhorn-backup-token-secret
data:
- secretKey: AWS_ACCESS_KEY_ID
remoteRef:
key: kv/longhorn/backup
property: AWS_ACCESS_KEY_ID
- secretKey: AWS_ENDPOINTS
remoteRef:
key: kv/longhorn/backup
property: AWS_ENDPOINTS
- secretKey: AWS_SECRET_ACCESS_KEY
remoteRef:
key: kv/longhorn/backup
property: AWS_SECRET_ACCESS_KEY

192
infra/longhorn/values.yaml Normal file
View File

@@ -0,0 +1,192 @@
longhorn:
global:
cattle:
systemDefaultRegistry: ""
image:
longhorn:
engine:
repository: longhornio/longhorn-engine
manager:
repository: longhornio/longhorn-manager
ui:
repository: longhornio/longhorn-ui
instanceManager:
repository: longhornio/longhorn-instance-manager
shareManager:
repository: longhornio/longhorn-share-manager
backingImageManager:
repository: longhornio/backing-image-manager
csi:
attacher:
repository: longhornio/csi-attacher
provisioner:
repository: longhornio/csi-provisioner
nodeDriverRegistrar:
repository: longhornio/csi-node-driver-registrar
resizer:
repository: longhornio/csi-resizer
snapshotter:
repository: longhornio/csi-snapshotter
pullPolicy: Always
service:
ui:
type: ClusterIP
nodePort: null
manager:
type: ClusterIP
nodePort: ""
loadBalancerIP: ""
loadBalancerSourceRanges: ""
persistence:
defaultClass: true
defaultFsType: ext4
defaultClassReplicaCount: 3
defaultDataLocality: disabled # best-effort otherwise
reclaimPolicy: Delete
migratable: false
recurringJobSelector:
enable: true
jobList: '[
{
"name":"backup",
"task":"backup",
"cron":"0 0 * * *",
"retain":24
}
]'
backingImage:
enable: false
name: ~
dataSourceType: ~
dataSourceParameters: ~
expectedChecksum: ~
csi:
kubeletRootDir: ~
attacherReplicaCount: ~
provisionerReplicaCount: ~
resizerReplicaCount: ~
snapshotterReplicaCount: ~
defaultSettings:
backupTarget: S3://longhorn-infra@us-east-1/
backupTargetCredentialSecret: longhorn-backup-token-secret
allowRecurringJobWhileVolumeDetached: ~
createDefaultDiskLabeledNodes: ~
defaultDataPath: ~
defaultDataLocality: ~
replicaSoftAntiAffinity: ~
replicaAutoBalance: ~
storageOverProvisioningPercentage: ~
storageMinimalAvailablePercentage: ~
upgradeChecker: ~
defaultReplicaCount: ~
defaultLonghornStaticStorageClass: longhorn
backupstorePollInterval: ~
taintToleration: ~
systemManagedComponentsNodeSelector: ~
priorityClass: ~
autoSalvage: ~
autoDeletePodWhenVolumeDetachedUnexpectedly: ~
disableSchedulingOnCordonedNode: ~
replicaZoneSoftAntiAffinity: ~
nodeDownPodDeletionPolicy: ~
allowNodeDrainWithLastHealthyReplica: ~
mkfsExt4Parameters: ~
disableReplicaRebuild: ~
replicaReplenishmentWaitInterval: ~
concurrentReplicaRebuildPerNodeLimit: ~
disableRevisionCounter: ~
systemManagedPodsImagePullPolicy: ~
allowVolumeCreationWithDegradedAvailability: ~
autoCleanupSystemGeneratedSnapshot: ~
concurrentAutomaticEngineUpgradePerNodeLimit: ~
backingImageCleanupWaitInterval: ~
backingImageRecoveryWaitInterval: ~
guaranteedEngineManagerCPU: ~
guaranteedReplicaManagerCPU: ~
kubernetesClusterAutoscalerEnabled: ~
orphanAutoDeletion: ~
storageNetwork: ~
privateRegistry:
createSecret: ~
registryUrl: ~
registryUser: ~
registryPasswd: ~
registrySecret: ~
longhornManager:
priorityClass: ~
tolerations: []
## If you want to set tolerations for Longhorn Manager DaemonSet, delete the `[]` in the line above
## and uncomment this example block
# - key: "key"
# operator: "Equal"
# value: "value"
# effect: "NoSchedule"
nodeSelector: {}
## If you want to set node selector for Longhorn Manager DaemonSet, delete the `{}` in the line above
## and uncomment this example block
# label-key1: "label-value1"
# label-key2: "label-value2"
longhornDriver:
priorityClass: ~
tolerations: []
## If you want to set tolerations for Longhorn Driver Deployer Deployment, delete the `[]` in the line above
## and uncomment this example block
# - key: "key"
# operator: "Equal"
# value: "value"
# effect: "NoSchedule"
nodeSelector: {}
## If you want to set node selector for Longhorn Driver Deployer Deployment, delete the `{}` in the line above
## and uncomment this example block
# label-key1: "label-value1"
# label-key2: "label-value2"
longhornUI:
priorityClass: ~
tolerations: []
## If you want to set tolerations for Longhorn UI Deployment, delete the `[]` in the line above
## and uncomment this example block
# - key: "key"
# operator: "Equal"
# value: "value"
# effect: "NoSchedule"
nodeSelector: {}
## If you want to set node selector for Longhorn UI Deployment, delete the `{}` in the line above
## and uncomment this example block
# label-key1: "label-value1"
# label-key2: "label-value2"
resources: {}
# We usually recommend not to specify default resources and to leave this as a conscious
# choice for the user. This also increases chances charts run on environments with little
# resources, such as Minikube. If you do want to specify resources, uncomment the following
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
# limits:
# cpu: 100m
# memory: 128Mi
# requests:
# cpu: 100m
# memory: 128Mi
#
ingress:
enabled: false
## Specify override namespace, specifically this is useful for using longhorn as sub-chart
## and its release namespace is not the `longhorn-system`
namespaceOverride: ""
# Annotations to add to the Longhorn Manager DaemonSet Pods. Optional.
annotations: {}
serviceAccount:
# Annotations to add to the service account
annotations: {}

View File

@@ -0,0 +1,12 @@
apiVersion: v2
name: metallb-system
description: A Helm chart for Kubernetes
type: application
version: 0.1.0
appVersion: "1.16.0"
dependencies:
- name: metallb
repository: https://metallb.github.io/metallb
version: 0.14.9

View File

@@ -0,0 +1,17 @@
apiVersion: metallb.io/v1beta1
kind: IPAddressPool
metadata:
name: cheap
spec:
addresses:
- 192.168.12.130-192.168.12.140
---
apiVersion: metallb.io/v1beta1
kind: L2Advertisement
metadata:
name: pool
namespace: metallb-system
spec:
ipAddressPools:
- cheap

View File

@@ -8,4 +8,4 @@ appVersion: 0.0.1
dependencies:
- name: traefik
repository: https://traefik.github.io/charts
version: 22.1.0
version: 34.0.0

47
infra/traefik/values.yaml Normal file
View File

@@ -0,0 +1,47 @@
traefik:
image:
registry: registry.durp.info
repository: traefik
pullPolicy: Always
deployment:
replicas: 3
revisionHistoryLimit: 1
ingressRoute:
dashboard:
enabled: true
additionalArguments:
- "--serversTransport.insecureSkipVerify=true"
- "--log.level=DEBUG"
- --experimental.plugins.jwt.moduleName=github.com/traefik-plugins/traefik-jwt-plugin
- --experimental.plugins.jwt.version=v0.7.0
autoscaling:
enabled: true
minReplicas: 3
maxReplicas: 10
metrics:
- type: Resource
resource:
name: cpu
target:
type: Utilization
averageUtilization: 80
behavior:
scaleDown:
stabilizationWindowSeconds: 300
policies:
- type: Pods
value: 1
periodSeconds: 60
# -- [Resources](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) for `traefik` container.
resources:
requests:
cpu: "100m"
memory: "512Mi"
limits:
memory: "512Mi"

View File

@@ -8,5 +8,5 @@ appVersion: 0.0.1
dependencies:
- name: vault
repository: https://helm.releases.hashicorp.com
version: 0.27.0
version: 0.29.1

View File

@@ -0,0 +1,33 @@
apiVersion: traefik.io/v1alpha1
kind: IngressRoute
metadata:
name: vault-ingress
annotations:
cert-manager.io/cluster-issuer: letsencrypt-production
spec:
entryPoints:
- websecure
routes:
- match: Host(`vault.infra.durp.info`)
kind: Rule
services:
- name: vault
port: 8200
scheme: https
tls:
secretName: vault-tls
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: vault-tls
spec:
secretName: vault-tls
issuerRef:
name: letsencrypt-production
kind: ClusterIssuer
commonName: "vault.infra.durp.info"
dnsNames:
- "vault.infra.durp.info"

View File

@@ -0,0 +1,4 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: issuer

View File

@@ -0,0 +1,17 @@
apiVersion: external-secrets.io/v1beta1
kind: ClusterSecretStore
metadata:
name: vault
spec:
provider:
vault:
server: "https://vault.infra.durp.info"
path: "kv"
version: "v2"
auth:
kubernetes:
mountPath: "kubernetes"
role: "external-secrets"
serviceAccountRef:
name: "vault"

140
infra/vault/values.yaml Normal file
View File

@@ -0,0 +1,140 @@
vault:
global:
enabled: true
tlsDisable: false
resources:
requests:
memory: 256Mi
cpu: 250m
limits:
memory: 256Mi
cpu: 250m
server:
image:
repository: "hashicorp/vault"
# These Resource Limits are in line with node requirements in the
# Vault Reference Architecture for a Small Cluster
#resources:
# requests:
# memory: 8Gi
# cpu: 2000m
# limits:
# memory: 16Gi
# cpu: 2000m
# For HA configuration and because we need to manually init the vault,
# we need to define custom readiness/liveness Probe settings
readinessProbe:
enabled: true
path: "/v1/sys/health?standbyok=true&sealedcode=204&uninitcode=204"
livenessProbe:
enabled: true
path: "/v1/sys/health?standbyok=true"
initialDelaySeconds: 60
# extraEnvironmentVars is a list of extra environment variables to set with the stateful set. These could be
# used to include variables required for auto-unseal.
extraEnvironmentVars:
VAULT_CACERT: /vault/userconfig/vault-server-tls/vault.ca
extraSecretEnvironmentVars:
- envName: VAULT_TOKEN
secretName: autounseal
secretKey: VAULT_TOKEN
volumes:
- name: userconfig-vault-server-tls
secret:
defaultMode: 420
secretName: vault-server-tls
volumeMounts:
- mountPath: /vault/userconfig/vault-server-tls
name: userconfig-vault-server-tls
readOnly: true
# This configures the Vault Statefulset to create a PVC for audit logs.
# See https://www.vaultproject.io/docs/audit/index.html to know more
auditStorage:
enabled: true
standalone:
enabled: false
config: |
disable_mlock = true
ui = true
listener "tcp" {
address = "[::]:8200"
cluster_address = "[::]:8201"
tls_cert_file = "/vault/userconfig/vault-server-tls/vault.crt"
tls_key_file = "/vault/userconfig/vault-server-tls/vault.key"
}
seal "transit" {
address = "https://root-vault.internal.durp.info"
disable_renewal = "false"
key_name = "autounseal"
mount_path = "transit/"
tls_skip_verify = "true"
}
storage "raft" {
path = "/vault/data"
}
# Run Vault in "HA" mode.
ha:
enabled: true
replicas: 3
raft:
enabled: true
setNodeId: true
config: |
ui = true
cluster_name = "vault-integrated-storage"
listener "tcp" {
address = "[::]:8200"
cluster_address = "[::]:8201"
tls_cert_file = "/vault/userconfig/vault-server-tls/vault.crt"
tls_key_file = "/vault/userconfig/vault-server-tls/vault.key"
}
seal "transit" {
address = "https://root-vault.internal.durp.info"
disable_renewal = "false"
key_name = "autounseal"
mount_path = "transit/"
tls_skip_verify = "true"
}
storage "raft" {
path = "/vault/data"
retry_join {
leader_api_addr = "https://vault-0.vault-internal:8200"
leader_ca_cert_file = "/vault/userconfig/vault-server-tls/vault.ca"
leader_client_cert_file = "/vault/userconfig/vault-server-tls/vault.crt"
leader_client_key_file = "/vault/userconfig/vault-server-tls/vault.key"
}
retry_join {
leader_api_addr = "https://vault-1.vault-internal:8200"
leader_ca_cert_file = "/vault/userconfig/vault-server-tls/vault.ca"
leader_client_cert_file = "/vault/userconfig/vault-server-tls/vault.crt"
leader_client_key_file = "/vault/userconfig/vault-server-tls/vault.key"
}
retry_join {
leader_api_addr = "https://vault-2.vault-internal:8200"
leader_ca_cert_file = "/vault/userconfig/vault-server-tls/vault.ca"
leader_client_cert_file = "/vault/userconfig/vault-server-tls/vault.crt"
leader_client_key_file = "/vault/userconfig/vault-server-tls/vault.key"
}
}
# Vault UI
ui:
enabled: false
serviceType: "LoadBalancer"
serviceNodePort: null
externalPort: 8200

View File

@@ -1,46 +0,0 @@
apiVersion: traefik.containo.us/v1alpha1
kind: IngressRoute
metadata:
name: argocd-ingress
annotations:
cert-manager.io/cluster-issuer: letsencrypt-production
spec:
entryPoints:
- websecure
routes:
- match: Host(`argocd.internal.durp.info`)
middlewares:
- name: whitelist
namespace: traefik
kind: Rule
services:
- name: argocd-server
port: 443
scheme: https
tls:
secretName: argocd-tls
---
kind: Service
apiVersion: v1
metadata:
name: argocd-server
spec:
type: ExternalName
externalName: argocd-server.argocd.svc.cluster.local
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: argocd-tls
spec:
secretName: argocd-tls
issuerRef:
name: letsencrypt-production
kind: ClusterIssuer
commonName: "argocd.internal.durp.info"
dnsNames:
- "argocd.internal.durp.info"

View File

@@ -1,9 +0,0 @@
kind: Service
apiVersion: v1
metadata:
name: gitea-external-dns
annotations:
external-dns.alpha.kubernetes.io/hostname: gitea.durp.info
spec:
type: ExternalName
externalName: durp.info

View File

@@ -1,9 +0,0 @@
kind: Service
apiVersion: v1
metadata:
name: jellyfin-external-dns
annotations:
external-dns.alpha.kubernetes.io/hostname: jellyfin.durp.info
spec:
type: ExternalName
externalName: durp.info

View File

@@ -1,9 +0,0 @@
kind: Service
apiVersion: v1
metadata:
name: kasm-external-dns
annotations:
external-dns.alpha.kubernetes.io/hostname: kasm.durp.info
spec:
type: ExternalName
externalName: durp.info

View File

@@ -1,9 +0,0 @@
kind: Service
apiVersion: v1
metadata:
name: plex-external-dns
annotations:
external-dns.alpha.kubernetes.io/hostname: plex.durp.info
spec:
type: ExternalName
externalName: durp.info

View File

@@ -9,6 +9,6 @@ appVersion: "1.16.0"
dependencies:
- name: argo-cd
repository: https://argoproj.github.io/argo-helm
version: 6.7.11
version: 6.11.1

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: internalproxy
path: master/internalproxy
directory:
recurse: true
destination:

View File

@@ -0,0 +1,59 @@
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: argocd
namespace: argocd
spec:
project: default
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: master/argocd
destination:
namespace: argocd
name: in-cluster
syncPolicy:
automated:
prune: true
selfHeal: true
syncOptions:
- CreateNamespace=true
---
apiVersion: traefik.io/v1alpha1
kind: IngressRoute
metadata:
name: argocd-ingress
annotations:
cert-manager.io/cluster-issuer: letsencrypt-production
spec:
entryPoints:
- websecure
routes:
- match: Host(`argocd.internal.durp.info`)
middlewares:
- name: whitelist
namespace: traefik
kind: Rule
services:
- name: argocd-server
port: 443
scheme: https
tls:
secretName: argocd-tls
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: argocd-tls
spec:
secretName: argocd-tls
issuerRef:
name: letsencrypt-production
kind: ClusterIssuer
commonName: "argocd.internal.durp.info"
dnsNames:
- "argocd.internal.durp.info"

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: authentik
path: master/authentik
destination:
namespace: authentik
name: in-cluster

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: bitwarden
path: master/bitwarden
directory:
recurse: true
destination:

View File

@@ -0,0 +1,20 @@
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: cert-manager
namespace: argocd
spec:
project: default
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: master/cert-manager
destination:
namespace: cert-manager
name: in-cluster
syncPolicy:
automated:
prune: true
selfHeal: true
syncOptions:
- CreateNamespace=true

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: crossplane
path: master/crossplane
destination:
namespace: crossplane
name: in-cluster

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: durpapi
path: master/durpapi
destination:
namespace: durpapi
name: in-cluster

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: durpot
path: master/durpot
destination:
namespace: durpot
name: in-cluster

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: external-dns
path: master/external-dns
destination:
namespace: external-dns
name: in-cluster

View File

@@ -0,0 +1,20 @@
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: external-secrets
namespace: argocd
spec:
project: default
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: master/external-secrets
destination:
namespace: external-secrets
name: in-cluster
syncPolicy:
automated:
prune: true
selfHeal: true
syncOptions:
- CreateNamespace=true

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: gatekeeper
path: master/gatekeeper
destination:
namespace: gatekeeper
name: in-cluster

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: gitlab-runner
path: master/gitlab-runner
destination:
namespace: gitlab-runner
name: in-cluster

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: heimdall
path: master/heimdall
destination:
namespace: heimdall
name: in-cluster

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: krakend
path: master/krakend
destination:
namespace: krakend
name: in-cluster

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: kube-prometheus-stack
path: master/kube-prometheus-stack
destination:
namespace: kube-prometheus-stack
name: in-cluster

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: kubeclarity
path: master/kubeclarity
destination:
namespace: kubeclarity
name: in-cluster

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: littlelink
path: master/littlelink
directory:
recurse: true
destination:

View File

@@ -0,0 +1,21 @@
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: longhorn-system
namespace: argocd
spec:
project: default
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: master/longhorn
destination:
namespace: longhorn-system
name: in-cluster
syncPolicy:
automated:
prune: true
selfHeal: true
syncOptions:
- CreateNamespace=true

View File

@@ -0,0 +1,22 @@
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: metallb-system
namespace: argocd
spec:
project: default
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: master/metallb-system
destination:
namespace: metallb-system
name: in-cluster
syncPolicy:
automated:
prune: true
selfHeal: true
syncOptions:
- CreateNamespace=true

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: nfs-client
path: master/nfs-client
directory:
recurse: true
destination:

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: open-webui
path: master/open-webui
destination:
namespace: open-webui
name: in-cluster

View File

@@ -1,16 +1,16 @@
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: argocd
name: traefik
namespace: argocd
spec:
project: default
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: argocd
path: master/traefik
destination:
namespace: argocd
namespace: traefik
name: in-cluster
syncPolicy:
automated:

View File

@@ -8,7 +8,7 @@ spec:
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: uptimekuma
path: master/uptimekuma
directory:
recurse: true
destination:

View File

@@ -0,0 +1,25 @@
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: vault
namespace: argocd
spec:
project: default
source:
repoURL: https://gitlab.com/developerdurp/homelab.git
targetRevision: main
path: master/vault
destination:
namespace: vault
name: in-cluster
syncPolicy:
automated:
prune: true
selfHeal: true
syncOptions:
- CreateNamespace=true
ignoreDifferences:
- group: admissionregistration.k8s.io
kind: MutatingWebhookConfiguration
jqPathExpressions:
- .webhooks[]?.clientConfig.caBundle

View File

@@ -9,4 +9,4 @@ appVersion: "1.16.0"
dependencies:
- name: authentik
repository: https://charts.goauthentik.io
version: 2024.4.1
version: 2024.8.3

View File

@@ -26,6 +26,8 @@ authentik:
server:
name: server
replicas: 3
worker:
replicas: 3
postgresql:
enabled: true
image:
@@ -42,6 +44,9 @@ authentik:
- ReadWriteMany
redis:
enabled: true
master:
persistence:
enabled: false
image:
registry: registry.internal.durp.info
repository: bitnami/redis

View File

@@ -17,7 +17,7 @@ spec:
spec:
containers:
- name: bitwarden
image: registry.internal.durp.info/vaultwarden/server:1.30.3
image: registry.internal.durp.info/vaultwarden/server:1.32.7
imagePullPolicy: Always
volumeMounts:
- name: bitwarden-pvc

View File

@@ -0,0 +1,11 @@
apiVersion: v2
name: cert-manager
description: A Helm chart for Kubernetes
type: application
version: 0.0.1
appVersion: 0.0.1
dependencies:
- name: cert-manager
repository: https://charts.jetstack.io
version: v1.15.3

View File

@@ -9,4 +9,4 @@ appVersion: "1.16.0"
dependencies:
- name: crossplane
repository: https://charts.crossplane.io/stable
version: 1.12.0
version: 1.17.1

View File

@@ -1,11 +1,13 @@
version: 0.1.0-dev0144
apiVersion: v2
name: durpapi
dependencies:
- version: 12.5.*
condition: postgresql.enabled
name: postgresql
repository: https://charts.bitnami.com/bitnami
description: A Helm chart for Kubernetes
type: application
version: 0.1.0-dev0184
appVersion: 0.1.0
dependencies:
- condition: postgresql.enabled
version: 12.5.*
repository: https://charts.bitnami.com/bitnami
name: postgresql

View File

@@ -10,15 +10,15 @@ deployment:
probe:
readiness:
httpGet:
path: /api/health/gethealth
path: /health/gethealth
port: 8080
liveness:
httpGet:
path: /api/health/gethealth
path: /health/gethealth
port: 8080
startup:
httpGet:
path: /api/health/gethealth
path: /health/gethealth
port: 8080
service:
type: ClusterIP

View File

@@ -9,4 +9,4 @@ appVersion: 0.0.1
dependencies:
- name: external-dns
repository: https://charts.bitnami.com/bitnami
version: 6.20.3
version: 8.3.8

View File

@@ -11,6 +11,6 @@ external-dns:
provider: cloudflare
cloudflare:
secretName : "external-dns"
proxied: true
proxied: false
policy: sync
policy: sync

View File

@@ -8,5 +8,5 @@ appVersion: 0.0.1
dependencies:
- name: external-secrets
repository: https://charts.external-secrets.io
version: 0.8.1
version: 0.10.4

Some files were not shown because too many files have changed in this diff Show More