Compare commits

...

20 Commits

Author SHA1 Message Date
Gitea Actions Bot
4857d9339f Auto-update README with current k8s applications
All checks were successful
Terraform / Terraform (pull_request) Successful in 46s
Generated by CI/CD workflow on 2025-11-24 14:32:40

This PR updates the README.md file with the current list of applications found in the k8s/ directory structure.
2025-11-24 14:32:40 +00:00
Ultradesu
17321b5d61 Added Remnawave
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 11s
Check with kubeconform / lint (push) Successful in 12s
Auto-update README / Generate README and Create MR (push) Successful in 10s
2025-11-24 16:32:00 +02:00
ab
c9177d9878 Update k8s/core/postgresql/external-secrets.yaml
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 11s
Check with kubeconform / lint (push) Successful in 16s
Auto-update README / Generate README and Create MR (push) Successful in 7s
2025-11-24 14:28:56 +00:00
ab
06f8b620ae Update k8s/apps/jellyfin/qbittorent.yaml
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 12s
Check with kubeconform / lint (push) Successful in 12s
Auto-update README / Generate README and Create MR (push) Successful in 6s
2025-11-24 12:12:24 +00:00
Ultradesu
a3c02b3510 Update external-secrets
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 12s
Check with kubeconform / lint (push) Successful in 17s
Auto-update README / Generate README and Create MR (push) Successful in 7s
2025-11-24 14:01:13 +02:00
ab
b1acb37700 Update k8s/apps/gitea/external-secrets.yaml
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 11s
Check with kubeconform / lint (push) Successful in 12s
Auto-update README / Generate README and Create MR (push) Successful in 6s
2025-11-24 11:58:05 +00:00
ab
a1288f4c99 Update k8s/core/external-secrets/app.yaml
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 11s
Check with kubeconform / lint (push) Successful in 12s
Auto-update README / Generate README and Create MR (push) Successful in 8s
2025-11-24 11:54:25 +00:00
Ultradesu
1672cdf402 Update external-secrets
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 10s
Check with kubeconform / lint (push) Successful in 13s
Auto-update README / Generate README and Create MR (push) Successful in 7s
2025-11-24 13:51:59 +02:00
Ultradesu
e96a75880e Update external-secrets
Some checks failed
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 11s
Auto-update README / Generate README and Create MR (push) Has been cancelled
Check with kubeconform / lint (push) Has been cancelled
2025-11-24 13:51:37 +02:00
ab
6c79543b84 Update k8s/core/external-secrets/app.yaml
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 11s
Check with kubeconform / lint (push) Successful in 14s
Auto-update README / Generate README and Create MR (push) Successful in 7s
2025-11-24 11:46:33 +00:00
ab
f41b86bad4 Update k8s/core/external-secrets/kustomization.yaml
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 12s
Check with kubeconform / lint (push) Successful in 14s
Auto-update README / Generate README and Create MR (push) Successful in 9s
2025-11-24 11:43:04 +00:00
ab
d44ade2298 Update k8s/core/argocd/kustomization.yaml
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 12s
Check with kubeconform / lint (push) Successful in 14s
Auto-update README / Generate README and Create MR (push) Successful in 10s
2025-11-24 11:41:20 +00:00
ab
462cb9189d Update k8s/core/prom-stack/kustomization.yaml
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 11s
Check with kubeconform / lint (push) Successful in 20s
Auto-update README / Generate README and Create MR (push) Successful in 9s
2025-11-24 11:39:51 +00:00
ab
37bb407a77 Update k8s/core/cert-manager/kustomization.yaml
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 12s
Check with kubeconform / lint (push) Successful in 12s
Auto-update README / Generate README and Create MR (push) Successful in 9s
2025-11-24 11:38:05 +00:00
ab
cae1c42004 Update k8s/core/cert-manager/values.yaml
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 12s
Check with kubeconform / lint (push) Successful in 15s
Auto-update README / Generate README and Create MR (push) Successful in 10s
2025-11-24 11:36:56 +00:00
ab
663f2e7504 Update k8s/core/cert-manager/values.yaml
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 11s
Check with kubeconform / lint (push) Successful in 26s
Auto-update README / Generate README and Create MR (push) Successful in 6s
2025-11-24 11:31:25 +00:00
ab
8679dbf47e Merge pull request 'Auto-update README with k8s applications' (#24) from auto-update-readme-20251124-111959 into main
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 13s
Reviewed-on: #24
2025-11-24 11:28:23 +00:00
Gitea Actions Bot
1ace105757 Auto-update README with current k8s applications
All checks were successful
Terraform / Terraform (pull_request) Successful in 1m14s
Generated by CI/CD workflow on 2025-11-24 11:19:59

This PR updates the README.md file with the current list of applications found in the k8s/ directory structure.
2025-11-24 11:19:59 +00:00
Ultradesu
ce4172b435 Increase CPU limits
Some checks are pending
Auto-update README / Generate README and Create MR (push) Waiting to run
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 12s
Check with kubeconform / lint (push) Successful in 23s
2025-11-24 13:19:04 +02:00
Ultradesu
c841f95bd2 Fixed iperf3 monitor
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 12s
Check with kubeconform / lint (push) Successful in 12s
Auto-update README / Generate README and Create MR (push) Successful in 11s
2025-11-19 00:02:10 +02:00
52 changed files with 346 additions and 68 deletions

View File

@@ -40,6 +40,7 @@ ArgoCD homelab project
| **greece-notifier** | [![greece-notifier](https://ag.hexor.cy/api/badge?name=greece-notifier&revision=true)](https://ag.hexor.cy/applications/argocd/greece-notifier) |
| **hexound** | [![hexound](https://ag.hexor.cy/api/badge?name=hexound&revision=true)](https://ag.hexor.cy/applications/argocd/hexound) |
| **immich** | [![immich](https://ag.hexor.cy/api/badge?name=immich&revision=true)](https://ag.hexor.cy/applications/argocd/immich) |
| **iperf3** | [![iperf3](https://ag.hexor.cy/api/badge?name=iperf3&revision=true)](https://ag.hexor.cy/applications/argocd/iperf3) |
| **jellyfin** | [![jellyfin](https://ag.hexor.cy/api/badge?name=jellyfin&revision=true)](https://ag.hexor.cy/applications/argocd/jellyfin) |
| **k8s-secrets** | [![k8s-secrets](https://ag.hexor.cy/api/badge?name=k8s-secrets&revision=true)](https://ag.hexor.cy/applications/argocd/k8s-secrets) |
| **khm** | [![khm](https://ag.hexor.cy/api/badge?name=khm&revision=true)](https://ag.hexor.cy/applications/argocd/khm) |
@@ -47,6 +48,7 @@ ArgoCD homelab project
| **paperless** | [![paperless](https://ag.hexor.cy/api/badge?name=paperless&revision=true)](https://ag.hexor.cy/applications/argocd/paperless) |
| **pasarguard** | [![pasarguard](https://ag.hexor.cy/api/badge?name=pasarguard&revision=true)](https://ag.hexor.cy/applications/argocd/pasarguard) |
| **qbittorent-nas** | [![qbittorent-nas](https://ag.hexor.cy/api/badge?name=qbittorent-nas&revision=true)](https://ag.hexor.cy/applications/argocd/qbittorent-nas) |
| **remnawave** | [![remnawave](https://ag.hexor.cy/api/badge?name=remnawave&revision=true)](https://ag.hexor.cy/applications/argocd/remnawave) |
| **rustdesk** | [![rustdesk](https://ag.hexor.cy/api/badge?name=rustdesk&revision=true)](https://ag.hexor.cy/applications/argocd/rustdesk) |
| **sonarr-stack** | [![sonarr-stack](https://ag.hexor.cy/api/badge?name=sonarr-stack&revision=true)](https://ag.hexor.cy/applications/argocd/sonarr-stack) |
| **stirling-pdf** | [![stirling-pdf](https://ag.hexor.cy/api/badge?name=stirling-pdf&revision=true)](https://ag.hexor.cy/applications/argocd/stirling-pdf) |

View File

@@ -36,7 +36,7 @@ spec:
cpu: "200m"
limits:
memory: "2Gi"
cpu: "1000m"
cpu: "1500m"
env:
- name: GITEA__service__REGISTER_MANUAL_CONFIRM
value: "true"
@@ -129,7 +129,7 @@ spec:
memory: "256Mi"
ephemeral-storage: "1Gi" # reserve ephemeral storage
limits:
cpu: "2000m"
cpu: "3000m"
memory: "4Gi"
ephemeral-storage: "28Gi" # hard cap for /data usage
volumeMounts:

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: gitea-runner-token
@@ -24,7 +24,7 @@ spec:
property: login.password
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: gitea-recapcha-creds

View File

@@ -30,7 +30,7 @@ spec:
cpu: "100m"
memory: "256Mi"
limits:
cpu: "2000m"
cpu: "3000m"
memory: "1Gi"
volumeMounts:
- name: data

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: greece-notifier-creds

View File

@@ -30,7 +30,7 @@ spec:
cpu: "50m"
limits:
memory: "128Mi"
cpu: "200m"
cpu: "300m"
command:
- git
- clone
@@ -49,7 +49,7 @@ spec:
cpu: "50m"
limits:
memory: "256Mi"
cpu: "200m"
cpu: "300m"
volumeMounts:
- name: hexound-repo
mountPath: /var/www/html

View File

@@ -23,7 +23,7 @@ spec:
cpu: "500m"
limits:
memory: "4Gi"
cpu: "2000m"
cpu: "3000m"
ports:
- containerPort: 2283
env:
@@ -160,7 +160,7 @@ spec:
cpu: "1000m"
limits:
memory: "8Gi"
cpu: "4000m"
cpu: "6000m"
env:
- name: TZ
value: Asia/Nicosia
@@ -201,7 +201,7 @@ spec:
cpu: "100m"
limits:
memory: "512Mi"
cpu: "500m"
cpu: "750m"
readinessProbe:
exec:
command: ["redis-cli", "ping"]

View File

@@ -84,7 +84,7 @@ spec:
cpu: "100m"
limits:
memory: "256Mi"
cpu: "500m"
cpu: "750m"
tolerations:
- effect: NoSchedule
operator: Exists

View File

@@ -79,7 +79,7 @@ spec:
cpu: "50m"
limits:
memory: "128Mi"
cpu: "200m"
cpu: "300m"
env:
- name: NODE_NAME
valueFrom:

View File

@@ -23,7 +23,7 @@ spec:
- sourceLabels: [__param_target]
targetLabel: instance
- targetLabel: __address__
replacement: ch.tail2fe2d.ts.net
replacement: iperf3-exporter-ch.iperf3.svc:9579
- port: metrics
path: /probe
interval: 5m
@@ -36,7 +36,7 @@ spec:
- sourceLabels: [__param_target]
targetLabel: instance
- targetLabel: __address__
replacement: us.tail2fe2d.ts.net
replacement: iperf3-exporter-us.iperf3.svc:9579
- port: metrics
path: /probe
interval: 5m
@@ -49,7 +49,7 @@ spec:
- sourceLabels: [__param_target]
targetLabel: instance
- targetLabel: __address__
replacement: iris.khv
replacement: iperf3-exporter-iris.iperf3.svc:9579
- port: metrics
path: /probe
interval: 5m
@@ -62,7 +62,7 @@ spec:
- sourceLabels: [__param_target]
targetLabel: instance
- targetLabel: __address__
replacement: home.homenet
replacement: iperf3-exporter-home.iperf3.svc:9579
- port: metrics
path: /probe
interval: 5m
@@ -75,7 +75,7 @@ spec:
- sourceLabels: [__param_target]
targetLabel: instance
- targetLabel: __address__
replacement: de.hexor.cy
replacement: iperf3-exporter-master.iperf3.svc:9579
- port: metrics
path: /probe
interval: 5m
@@ -88,7 +88,7 @@ spec:
- sourceLabels: [__param_target]
targetLabel: instance
- targetLabel: __address__
replacement: it.hexor.cy
replacement: iperf3-exporter-it.iperf3.svc:9579
- port: metrics
path: /probe
interval: 5m
@@ -101,7 +101,7 @@ spec:
- sourceLabels: [__param_target]
targetLabel: instance
- targetLabel: __address__
replacement: nas.homenet
replacement: iperf3-exporter-nas.iperf3.svc:9579
- port: metrics
path: /probe
interval: 5m
@@ -114,7 +114,7 @@ spec:
- sourceLabels: [__param_target]
targetLabel: instance
- targetLabel: __address__
replacement: spb.tail2fe2d.ts.net
replacement: iperf3-exporter-spb.iperf3.svc:9579
metricRelabelings:
- sourceLabels: [__name__]
regex: iperf3_(.+)

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: vpn-creds
@@ -76,11 +76,14 @@ spec:
secretKeyRef:
name: vpn-creds
key: ss_link
command: ["/bin/bash", "-c", "rm /etc/shadowsocks-rust/config.json && sslocal --online-config-url $SS_LINK --local-addr 127.0.0.1:8081 -U --protocol http"]
command: ["/bin/bash", "-c", "rm /etc/shadowsocks-rust/config.json && sslocal --server-url $SS_LINK --local-addr 127.0.0.1:8081 -U --protocol http"]
resources:
requests:
memory: "64Mi"
cpu: "200m"
cpu: "300m"
limits:
memory: "128Mi"
cpu: "300m"
---
apiVersion: v1
kind: Service

View File

@@ -6,7 +6,7 @@ resources:
cpu: "1000m"
limits:
memory: "8Gi"
cpu: "4000m"
cpu: "6000m"
nodeSelector:
kubernetes.io/hostname: master.tail2fe2d.ts.net
persistence:

View File

@@ -40,7 +40,7 @@ spec:
cpu: "50m"
limits:
memory: "128Mi"
cpu: "100m"
cpu: "150m"
livenessProbe:
httpGet:
path: /health

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: openai-creds

View File

@@ -29,7 +29,7 @@ spec:
cpu: "100m"
limits:
memory: "1Gi"
cpu: "500m"
cpu: "750m"
command:
- /bin/sh
- -c

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: khm-pg-creds

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: oidc-secret

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: postgres-and-oauth-creds

View File

@@ -13,7 +13,7 @@ resources:
cpu: "200m"
limits:
memory: "2Gi"
cpu: "1000m"
cpu: "1500m"
service:
type: ClusterIP

View File

@@ -6,7 +6,7 @@ resources:
cpu: "500m"
limits:
memory: "4Gi"
cpu: "2000m"
cpu: "3000m"
initContainers:
install-tesseract-langs:
image: ghcr.io/paperless-ngx/paperless-ngx:2.18.2
@@ -16,7 +16,7 @@ initContainers:
cpu: "100m"
limits:
memory: "1Gi"
cpu: "500m"
cpu: "750m"
command: ["/bin/sh", "-c"]
args:
- apt-get update && apt-get install -y --reinstall tesseract-ocr-rus tesseract-ocr-jpn tesseract-ocr-chi-sim tesseract-ocr-eng tesseract-ocr-ell && cp -v -r /usr/share/tesseract-ocr/5/tessdata/* /custom-tessdata/

View File

@@ -13,7 +13,7 @@ resources:
cpu: "100m"
limits:
memory: "1Gi"
cpu: "500m"
cpu: "750m"
service:
type: ClusterIP

View File

@@ -144,7 +144,7 @@ spec:
cpu: "50m"
limits:
memory: "128Mi"
cpu: "100m"
cpu: "150m"
volumeMounts:
- name: shared-data
mountPath: /shared
@@ -204,7 +204,7 @@ spec:
cpu: "100m"
limits:
memory: "512Mi"
cpu: "500m"
cpu: "750m"
volumeMounts:
- name: shared-data
mountPath: /shared

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: pasarguard-secrets

View File

@@ -0,0 +1,21 @@
apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: remnawave
namespace: argocd
spec:
project: apps
destination:
namespace: remnawave
server: https://kubernetes.default.svc
source:
repoURL: ssh://git@gt.hexor.cy:30022/ab/homelab.git
targetRevision: HEAD
path: k8s/apps/remnawave
syncPolicy:
automated:
selfHeal: true
prune: true
syncOptions:
- CreateNamespace=true

View File

@@ -0,0 +1,71 @@
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: remnawave
labels:
app: remnawave
annotations:
reloader.stakater.com/auto: "true"
spec:
selector:
matchLabels:
app: remnawave
replicas: 1
strategy:
type: RollingUpdate
template:
metadata:
labels:
app: remnawave
spec:
containers:
- name: remnawave
image: 'remnawave/backend:2'
imagePullPolicy: Always
envFrom:
- secretRef:
name: remnawave-secrets
env:
- name: REDIS_URL
value: "redis://remnawave-redis:6379"
ports:
- name: http
containerPort: 3000
protocol: TCP
- name: metrics
containerPort: 3001
protocol: TCP
livenessProbe:
httpGet:
path: /health
port: 3001
initialDelaySeconds: 30
periodSeconds: 30
timeoutSeconds: 5
failureThreshold: 3
readinessProbe:
httpGet:
path: /health
port: 3001
initialDelaySeconds: 10
periodSeconds: 10
timeoutSeconds: 3
failureThreshold: 3
---
apiVersion: v1
kind: Service
metadata:
name: remnawave
spec:
selector:
app: remnawave
ports:
- name: http
protocol: TCP
port: 3000
targetPort: 3000
- name: metrics
protocol: TCP
port: 3001
targetPort: 3001

View File

@@ -0,0 +1,64 @@
---
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: remnawave-secrets
spec:
target:
name: remnawave-secrets
deletionPolicy: Delete
template:
type: Opaque
data:
DATABASE_URL: |-
postgresql://remnawave:{{ .pg_pass }}@psql.psql.svc:5432/remnawave
# JWT_AUTH_SECRET: |-
# {{ .jwt_auth_secret }}
# JWT_API_TOKENS_SECRET: |-
# {{ .jwt_api_tokens_secret }}
# METRICS_USER: |-
# {{ .metrics_user }}
# METRICS_PASS: |-
# {{ .metrics_pass }}
data:
- secretKey: pg_pass
sourceRef:
storeRef:
name: vaultwarden-login
kind: ClusterSecretStore
remoteRef:
key: 2a9deb39-ef22-433e-a1be-df1555625e22
property: fields[10].value
# - secretKey: jwt_auth_secret
# sourceRef:
# storeRef:
# name: vaultwarden-login
# kind: ClusterSecretStore
# remoteRef:
# key: 35ec5880-2576-401b-a89a-3c9d56b9c1de
# property: login.password
# - secretKey: jwt_api_tokens_secret
# sourceRef:
# storeRef:
# name: vaultwarden-login
# kind: ClusterSecretStore
# remoteRef:
# key: 35ec5880-2576-401b-a89a-3c9d56b9c1de
# property: login.password
# - secretKey: metrics_user
# sourceRef:
# storeRef:
# name: vaultwarden-login
# kind: ClusterSecretStore
# remoteRef:
# key: 35ec5880-2576-401b-a89a-3c9d56b9c1de
# property: login.username
# - secretKey: metrics_pass
# sourceRef:
# storeRef:
# name: vaultwarden-login
# kind: ClusterSecretStore
# remoteRef:
# key: 35ec5880-2576-401b-a89a-3c9d56b9c1de
# property: login.password

View File

@@ -0,0 +1,9 @@
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- ./app.yaml
- ./external-secrets.yaml
- ./deployment.yaml
- ./redis-deployment.yaml
- ./servicemonitor.yaml

View File

@@ -0,0 +1,71 @@
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: remnawave-redis
labels:
app: remnawave-redis
spec:
selector:
matchLabels:
app: remnawave-redis
replicas: 1
strategy:
type: RollingUpdate
template:
metadata:
labels:
app: remnawave-redis
spec:
containers:
- name: redis
image: 'valkey/valkey:8.1-alpine'
imagePullPolicy: Always
ports:
- name: redis
containerPort: 6379
protocol: TCP
livenessProbe:
exec:
command:
- valkey-cli
- ping
initialDelaySeconds: 30
periodSeconds: 10
timeoutSeconds: 5
failureThreshold: 3
readinessProbe:
exec:
command:
- valkey-cli
- ping
initialDelaySeconds: 5
periodSeconds: 5
timeoutSeconds: 3
failureThreshold: 3
volumeMounts:
- name: redis-data
mountPath: /data
resources:
requests:
memory: "64Mi"
cpu: "50m"
limits:
memory: "256Mi"
cpu: "200m"
volumes:
- name: redis-data
emptyDir: {}
---
apiVersion: v1
kind: Service
metadata:
name: remnawave-redis
spec:
selector:
app: remnawave-redis
ports:
- name: redis
protocol: TCP
port: 6379
targetPort: 6379

View File

@@ -0,0 +1,21 @@
---
apiVersion: monitoring.coreos.com/v1
kind: ServiceMonitor
metadata:
name: remnawave-metrics
labels:
app: remnawave
release: prometheus
spec:
selector:
matchLabels:
app: remnawave
endpoints:
- port: metrics
path: /metrics
interval: 30s
scrapeTimeout: 10s
honorLabels: true
namespaceSelector:
matchNames:
- remnawave

View File

@@ -27,7 +27,7 @@ spec:
cpu: "100m"
limits:
memory: "512Mi"
cpu: "500m"
cpu: "750m"
command: ["hbbs"]
args:
- "--relay-servers"
@@ -98,7 +98,7 @@ spec:
cpu: "100m"
limits:
memory: "512Mi"
cpu: "500m"
cpu: "750m"
command: ["hbbr"]
args:
- "--port"

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: rustdesk-keys

View File

@@ -4,7 +4,7 @@ resources:
cpu: "100m"
limits:
memory: "1Gi"
cpu: "500m"
cpu: "750m"
nodeSelector:
kubernetes.io/hostname: master.tail2fe2d.ts.net

View File

@@ -6,7 +6,7 @@ resources:
cpu: "100m"
limits:
memory: "1Gi"
cpu: "500m"
cpu: "750m"
nodeSelector:
kubernetes.io/hostname: master.tail2fe2d.ts.net

View File

@@ -6,7 +6,7 @@ resources:
cpu: "200m"
limits:
memory: "2Gi"
cpu: "1000m"
cpu: "1500m"
nodeSelector:
kubernetes.io/hostname: master.tail2fe2d.ts.net

View File

@@ -33,7 +33,7 @@ resources:
cpu: "200m"
limits:
memory: "2Gi"
cpu: "1000m"
cpu: "1500m"
probes:
liveness:

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: get-id-bot
@@ -24,7 +24,7 @@ spec:
property: fields[0].value
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: desubot

View File

@@ -37,7 +37,7 @@ spec:
cpu: "100m"
limits:
memory: "1Gi"
cpu: "500m"
cpu: "750m"
env:
- name: DOMAIN
value: https://vw.hexor.cy

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: admin-token

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: outfleet-secrets
@@ -51,7 +51,7 @@ spec:
property: fields[1].value
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: outline-config

View File

@@ -174,7 +174,7 @@ spec:
resources:
limits:
memory: "512Mi"
cpu: "500m"
cpu: "750m"
requests:
memory: "256Mi"
cpu: "250m"

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: oidc-creds

View File

@@ -10,7 +10,7 @@ resources:
helmCharts:
- name: argo-cd
repo: https://argoproj.github.io/argo-helm
version: 8.1.3
version: 9.1.4
releaseName: argocd
namespace: argocd
valuesFile: values.yaml

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: authentik-creds

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: cloudflare-creds
@@ -22,7 +22,7 @@ spec:
key: 8ae1dcb1-1182-48a1-8733-ca1144ea754b
property: fields[0].value
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: aws-creds

View File

@@ -10,7 +10,7 @@ resources:
helmCharts:
- name: cert-manager
repo: https://charts.jetstack.io
version: 1.17.1
version: 1.19.1
releaseName: cert-manager
namespace: cert-manager
valuesFile: values.yaml

View File

@@ -1,2 +1,6 @@
crds:
enabled: true
prometheus:
enabled: true
servicemonitor:
enabled: true

View File

@@ -18,4 +18,4 @@ spec:
prune: true
syncOptions:
- CreateNamespace=true
- ServerSideApply=true

View File

@@ -128,7 +128,7 @@ spec:
app.kubernetes.io/name: external-secrets
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ClusterSecretStore
metadata:
name: vaultwarden-login
@@ -141,7 +141,7 @@ spec:
result:
jsonPath: "$.data.{{ .remoteRef.property }}"
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ClusterSecretStore
metadata:
name: vaultwarden-fields

View File

@@ -2,13 +2,12 @@ apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- app.yaml
- bitwarden-store.yaml
helmCharts:
- name: external-secrets
repo: https://charts.external-secrets.io
version: 0.16.2
version: 1.1.0
releaseName: external-secrets
namespace: external-secrets
valuesFile: values.yaml

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: postgres-creds
@@ -90,7 +90,7 @@ spec:
key: 832042b9-7edb-4f4c-9254-3c8884ba9733
property: fields[2].value
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: postgres-users
@@ -119,6 +119,8 @@ spec:
{{ .outfleet_rs }}
USER_pasarguard: |-
{{ .pasarguard }}
USER_remnawave: |-
{{ .remnawave }}
data:
- secretKey: authentik
sourceRef:
@@ -219,3 +221,14 @@ spec:
metadataPolicy: None
key: 2a9deb39-ef22-433e-a1be-df1555625e22
property: fields[9].value
- secretKey: remnawave
sourceRef:
storeRef:
name: vaultwarden-login
kind: ClusterSecretStore
remoteRef:
conversionStrategy: Default
decodingStrategy: None
metadataPolicy: None
key: 2a9deb39-ef22-433e-a1be-df1555625e22
property: fields[10].value

View File

@@ -1,5 +1,5 @@
---
apiVersion: external-secrets.io/v1beta1
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: grafana-admin

View File

@@ -9,7 +9,7 @@ resources:
helmCharts:
- name: kube-prometheus-stack
repo: https://prometheus-community.github.io/helm-charts
version: 70.4.2
version: 79.7.1
releaseName: prometheus
namespace: prometheus
valuesFile: prom-values.yaml
@@ -17,7 +17,7 @@ helmCharts:
- name: grafana
repo: https://grafana.github.io/helm-charts
version: 8.11.4
version: 10.2.0
releaseName: grafana
namespace: prometheus
valuesFile: grafana-values.yaml