Skip to content

Commit a2017c2

Browse files
update cluster definitions
1 parent 3cb2248 commit a2017c2

36 files changed

+723
-22
lines changed

clusters/argo-svc.dd.soeren.cloud/apps/aether/external-secret-aether.yaml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,3 +56,11 @@ spec:
5656
remoteRef:
5757
key: "secret/soeren.cloud/env/prod/aws-s3/credentials/taskwarrior-prod-aether"
5858
property: "AWS_SECRET_ACCESS_KEY"
59+
- secretKey: "oidc_client_id"
60+
remoteRef:
61+
key: "secret/soeren.cloud/env/prod/keycloak/soerencloud/clients/aether"
62+
property: "client_id"
63+
- secretKey: "oidc_secret_id"
64+
remoteRef:
65+
key: "secret/soeren.cloud/env/prod/keycloak/soerencloud/clients/aether"
66+
property: "secret_id"

clusters/argo-svc.dd.soeren.cloud/apps/aether/kustomization.yaml

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,34 @@ resources:
77
- namespace.yaml
88
- external-secret-aether.yaml
99
- external-secret-aether-taskwarrior.yaml
10+
images:
11+
- name: ghcr.io/soerenschneider/aether
12+
newName: cr.svc.dd.soeren.cloud/aether
13+
newTag: latest
1014
patches:
15+
- target:
16+
kind: Deployment
17+
name: aether
18+
patch: |
19+
- op: replace
20+
path: /spec/template/spec/containers/0/imagePullPolicy
21+
value: "Always"
22+
- op: add
23+
path: /spec/template/spec/volumes/-
24+
value:
25+
name: aether-secret
26+
secret:
27+
secretName: aether
28+
items:
29+
- key: oidc_secret_id
30+
path: aether_oidc_secret_id
31+
- op: add
32+
path: /spec/template/spec/containers/0/volumeMounts/-
33+
value:
34+
name: aether-secret
35+
mountPath: /aether_oidc_secret_id
36+
subPath: aether_oidc_secret_id
37+
readOnly: true
1138
- target:
1239
kind: VirtualService
1340
name: aether
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
apiVersion: kustomize.config.k8s.io/v1beta1
3+
kind: Kustomization
4+
namespace: container-registry
5+
resources:
6+
- ../../../../apps/container-registry
7+
- namespace.yaml
8+
components:
9+
- ../../../../apps/container-registry/components/istio
10+
patches:
11+
- target:
12+
kind: VirtualService
13+
name: container-registry
14+
patch: |-
15+
- op: replace
16+
path: "/spec/hosts"
17+
value:
18+
- "cr.svc.dd.soeren.cloud"
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
---
2+
kind: Namespace
3+
apiVersion: v1
4+
metadata:
5+
name: container-registry
6+
labels:
7+
name: container-registry
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
---
2+
apiVersion: "external-secrets.io/v1"
3+
kind: "ExternalSecret"
4+
metadata:
5+
name: "jellyfin-restic-sqlite"
6+
spec:
7+
refreshInterval: "1h"
8+
secretStoreRef:
9+
name: "vault"
10+
kind: "ClusterSecretStore"
11+
target:
12+
name: "jellyfin-restic-sqlite"
13+
creationPolicy: "Owner"
14+
data:
15+
- secretKey: "AWS_ACCESS_KEY_ID"
16+
remoteRef:
17+
key: "secret/soeren.cloud/env/prod/restic/jellyfin-sqlite/aws-credentials"
18+
property: "AWS_ACCESS_KEY_ID"
19+
- secretKey: "AWS_SECRET_ACCESS_KEY"
20+
remoteRef:
21+
key: "secret/soeren.cloud/env/prod/restic/jellyfin-sqlite/aws-credentials"
22+
property: "AWS_SECRET_ACCESS_KEY"
23+
- secretKey: "RESTIC_PASSWORD"
24+
remoteRef:
25+
key: "secret/soeren.cloud/env/prod/restic/jellyfin-sqlite/restic"
26+
property: "pass"

clusters/argo-svc.dd.soeren.cloud/apps/jellyfin/kustomization.yaml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,15 @@ kind: Kustomization
44
namespace: "jellyfin"
55
resources:
66
- namespace.yaml
7+
- external-secret-jellyfin-restic-sqlite.yaml
78
- external-secret-samba.yaml
89
- samba.yaml
910
- ../../../../apps/jellyfin
1011
components:
1112
- ../../../../apps/jellyfin/components/istio
1213
- ../../../../apps/jellyfin/components/pvc-config
1314
- ../../../../apps/jellyfin/components/storage-healthcheck
15+
- ../../../../apps/jellyfin/components/restic-sqlite
1416
patches:
1517
- target:
1618
kind: "VirtualService"
@@ -33,3 +35,11 @@ patches:
3335
name: "media"
3436
persistentVolumeClaim:
3537
claimName: "media"
38+
configMapGenerator:
39+
- name: "jellyfin-restic-sqlite"
40+
options:
41+
disableNameSuffixHash: true
42+
literals:
43+
- "RESTIC_REPOSITORY=s3:https://s3.amazonaws.com/soerenschneider-restic-prod/jellyfin-sqlite"
44+
- "RESTIC_HOST=svc.dd.soeren.cloud"
45+
- "SQLITE_FILE=/app-data/data/library.db"

clusters/argo-svc.dd.soeren.cloud/apps/jellyfin/samba.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ spec:
1515
driver: "smb.csi.k8s.io"
1616
volumeHandle: "jellyfin-media"
1717
volumeAttributes:
18-
source: "//nas.dd.soeren.cloud/movies"
18+
source: "//nas.dd.soeren.cloud/media"
1919
options: "vers=3,seal"
2020
nodeStageSecretRef:
2121
name: "smbcreds"

clusters/argo-svc.dd.soeren.cloud/apps/jellyporter/kustomization.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ kind: Kustomization
44
namespace: "jellyporter"
55
resources:
66
- namespace.yaml
7-
- external-secret-samba.yaml
7+
- external-secret-jellyporter.yaml
88
- ../../../../apps/jellyporter
99
components:
1010
- ../../../../apps/jellyporter/components/pvc
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
---
2+
apiVersion: "external-secrets.io/v1"
3+
kind: "ExternalSecret"
4+
metadata:
5+
name: "linkding-restic-postgres"
6+
spec:
7+
refreshInterval: "1h"
8+
secretStoreRef:
9+
name: "vault"
10+
kind: "ClusterSecretStore"
11+
target:
12+
name: "linkding-restic-postgres"
13+
creationPolicy: "Owner"
14+
data:
15+
- secretKey: "AWS_ACCESS_KEY_ID"
16+
remoteRef:
17+
key: "secret/soeren.cloud/env/prod/restic/linkding-postgres/aws-credentials"
18+
property: "AWS_ACCESS_KEY_ID"
19+
- secretKey: "AWS_SECRET_ACCESS_KEY"
20+
remoteRef:
21+
key: "secret/soeren.cloud/env/prod/restic/linkding-postgres/aws-credentials"
22+
property: "AWS_SECRET_ACCESS_KEY"
23+
- secretKey: "RESTIC_PASSWORD"
24+
remoteRef:
25+
key: "secret/soeren.cloud/env/prod/restic/linkding-postgres/restic"
26+
property: "pass"
27+
- secretKey: "POSTGRES_USER"
28+
remoteRef:
29+
key: "secret/soeren.cloud/env/prod/linkding"
30+
property: "POSTGRES_USER"
31+
- secretKey: "PGPASSWORD"
32+
remoteRef:
33+
key: "secret/soeren.cloud/env/prod/linkding"
34+
property: "POSTGRES_PASSWORD"
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
apiVersion: "external-secrets.io/v1"
3+
kind: "ExternalSecret"
4+
metadata:
5+
name: "linkding-postgres"
6+
spec:
7+
refreshInterval: "1h"
8+
secretStoreRef:
9+
name: "vault"
10+
kind: "ClusterSecretStore"
11+
target:
12+
name: "linkding-postgres"
13+
creationPolicy: "Owner"
14+
data:
15+
- secretKey: "username"
16+
remoteRef:
17+
key: "secret/soeren.cloud/env/prod/linkding"
18+
property: "POSTGRES_USER"
19+
- secretKey: "password"
20+
remoteRef:
21+
key: "secret/soeren.cloud/env/prod/linkding"
22+
property: "POSTGRES_PASSWORD"

0 commit comments

Comments
 (0)