diff --git a/clusters/cl01tl/manifests/blocky/ConfigMap-blocky.yaml b/clusters/cl01tl/manifests/blocky/ConfigMap-blocky.yaml index 7ec2c3a1e..d97e98a05 100644 --- a/clusters/cl01tl/manifests/blocky/ConfigMap-blocky.yaml +++ b/clusters/cl01tl/manifests/blocky/ConfigMap-blocky.yaml @@ -119,7 +119,6 @@ data: jellystat IN CNAME traefik-cl01tl kiwix IN CNAME traefik-cl01tl komodo IN CNAME traefik-cl01tl - kronic IN CNAME traefik-cl01tl lidarr IN CNAME traefik-cl01tl lidatube IN CNAME traefik-cl01tl listenarr IN CNAME traefik-cl01tl diff --git a/clusters/cl01tl/manifests/blocky/Deployment-blocky.yaml b/clusters/cl01tl/manifests/blocky/Deployment-blocky.yaml index a4d68dea0..f1eac31f0 100644 --- a/clusters/cl01tl/manifests/blocky/Deployment-blocky.yaml +++ b/clusters/cl01tl/manifests/blocky/Deployment-blocky.yaml @@ -22,7 +22,7 @@ spec: template: metadata: annotations: - checksum/configMaps: 0e833e54799f5b97aed8f29e4ab15bcaec039a2bbfb88bdb0b45ad1b97c1148e + checksum/configMaps: a0d9f2795d2d2013805f4996524f6a29bfa2576e1c3633068b6f011e9648b2e0 labels: app.kubernetes.io/controller: main app.kubernetes.io/instance: blocky diff --git a/clusters/cl01tl/manifests/gatus/ConfigMap-gatus.yaml b/clusters/cl01tl/manifests/gatus/ConfigMap-gatus.yaml index c326d77a2..51bb9de19 100644 --- a/clusters/cl01tl/manifests/gatus/ConfigMap-gatus.yaml +++ b/clusters/cl01tl/manifests/gatus/ConfigMap-gatus.yaml @@ -231,14 +231,6 @@ data: interval: 30s name: n8n url: https://n8n.alexlebens.net - - alerts: - - type: ntfy - conditions: - - '[STATUS] == 401' - group: core - interval: 30s - name: kronic - url: https://kronic.alexlebens.net - alerts: - type: ntfy conditions: diff --git a/clusters/cl01tl/manifests/gatus/Deployment-gatus.yaml b/clusters/cl01tl/manifests/gatus/Deployment-gatus.yaml index e6ca3f1ed..70c193134 100644 --- a/clusters/cl01tl/manifests/gatus/Deployment-gatus.yaml +++ b/clusters/cl01tl/manifests/gatus/Deployment-gatus.yaml @@ -26,7 +26,7 @@ spec: app.kubernetes.io/name: gatus app.kubernetes.io/instance: gatus annotations: - checksum/config: 46a5f9507de33e28db7c4eb9bf27bd9f37c375a647cde6a81cffe037692377f2 + checksum/config: 0a23a7fc337d39aea7dea5f7cb496e32467bf2856b90e3a0283ee49684422298 spec: serviceAccountName: default automountServiceAccountToken: false diff --git a/clusters/cl01tl/manifests/homepage/ConfigMap-homepage.yaml b/clusters/cl01tl/manifests/homepage/ConfigMap-homepage.yaml index edadf3213..34ba695b2 100644 --- a/clusters/cl01tl/manifests/homepage/ConfigMap-homepage.yaml +++ b/clusters/cl01tl/manifests/homepage/ConfigMap-homepage.yaml @@ -270,12 +270,6 @@ data: href: https://n8n.alexlebens.net siteMonitor: http://n8n-main.n8n:80 statusStyle: dot - - Jobs: - icon: https://raw.githubusercontent.com/mshade/kronic/main/static/android-chrome-192x192.png - description: Kronic - href: https://kronic.alexlebens.net - siteMonitor: http://kronic.kronic:80 - statusStyle: dot - Uptime: icon: sh-gatus.webp description: Gatus diff --git a/clusters/cl01tl/manifests/homepage/Deployment-homepage.yaml b/clusters/cl01tl/manifests/homepage/Deployment-homepage.yaml index 91ac7e5bd..ed8558e89 100644 --- a/clusters/cl01tl/manifests/homepage/Deployment-homepage.yaml +++ b/clusters/cl01tl/manifests/homepage/Deployment-homepage.yaml @@ -24,7 +24,7 @@ spec: template: metadata: annotations: - checksum/configMaps: aa2e66e21f5f316af1bcb1030b3c63972c06858c45f340911c2727af9f4053d3 + checksum/configMaps: 45df1f089469334856418ad71a92e7aab49a18e2a0f222c66fcaebce3eac35c8 checksum/secrets: d3ba83f111cd32f92c909268c55ad8bbd4f9e299b74b35b33c1a011180d8b378 labels: app.kubernetes.io/controller: main diff --git a/clusters/cl01tl/manifests/kronic/ClusterRole-kronic.yaml b/clusters/cl01tl/manifests/kronic/ClusterRole-kronic.yaml deleted file mode 100644 index 3a563c091..000000000 --- a/clusters/cl01tl/manifests/kronic/ClusterRole-kronic.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - labels: - helm.sh/chart: kronic-0.1.7 - app.kubernetes.io/name: kronic - app.kubernetes.io/instance: kronic - app.kubernetes.io/version: "v0.1.4" - app.kubernetes.io/managed-by: Helm - name: kronic -rules: - - apiGroups: - - "" - resources: - - pods - - events - - pods/log - - namespaces - verbs: - - get - - list - - watch - - apiGroups: - - batch - resources: - - jobs - - cronjobs - - cronjobs/status - verbs: - - "*" diff --git a/clusters/cl01tl/manifests/kronic/ClusterRoleBinding-kronic.yaml b/clusters/cl01tl/manifests/kronic/ClusterRoleBinding-kronic.yaml deleted file mode 100644 index 71c819c9a..000000000 --- a/clusters/cl01tl/manifests/kronic/ClusterRoleBinding-kronic.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - labels: - helm.sh/chart: kronic-0.1.7 - app.kubernetes.io/name: kronic - app.kubernetes.io/instance: kronic - app.kubernetes.io/version: "v0.1.4" - app.kubernetes.io/managed-by: Helm - name: kronic -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: kronic -subjects: - - kind: ServiceAccount - name: kronic - namespace: "kronic" diff --git a/clusters/cl01tl/manifests/kronic/Deployment-kronic.yaml b/clusters/cl01tl/manifests/kronic/Deployment-kronic.yaml deleted file mode 100644 index 353961e83..000000000 --- a/clusters/cl01tl/manifests/kronic/Deployment-kronic.yaml +++ /dev/null @@ -1,64 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - name: kronic - labels: - helm.sh/chart: kronic-0.1.7 - app.kubernetes.io/name: kronic - app.kubernetes.io/instance: kronic - app.kubernetes.io/version: "v0.1.4" - app.kubernetes.io/managed-by: Helm -spec: - replicas: 1 - selector: - matchLabels: - app.kubernetes.io/name: kronic - app.kubernetes.io/instance: kronic - template: - metadata: - labels: - app.kubernetes.io/name: kronic - app.kubernetes.io/instance: kronic - spec: - serviceAccountName: kronic - securityContext: {} - containers: - - name: kronic - securityContext: {} - image: "ghcr.io/mshade/kronic:v0.1.4" - imagePullPolicy: IfNotPresent - env: - - name: KRONIC_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - - name: KRONIC_ADMIN_PASSWORD - valueFrom: - secretKeyRef: - name: kronic-config-secret - key: password - - name: KRONIC_ADMIN_USERNAME - value: "kronic" - - name: KRONIC_ALLOW_NAMESPACES - value: "gitea,vault,talos,libation,kubernetes-cloudflare-ddns" - - name: KRONIC_NAMESPACE_ONLY - value: "" - ports: - - name: http - containerPort: 8000 - protocol: TCP - livenessProbe: - httpGet: - path: /healthz - port: http - readinessProbe: - httpGet: - path: /healthz - port: http - resources: - limits: - cpu: 1 - memory: 1024Mi - requests: - cpu: 10m - memory: 256Mi diff --git a/clusters/cl01tl/manifests/kronic/ExternalSecret-kronic-config-secret.yaml b/clusters/cl01tl/manifests/kronic/ExternalSecret-kronic-config-secret.yaml deleted file mode 100644 index 8ea1f4d94..000000000 --- a/clusters/cl01tl/manifests/kronic/ExternalSecret-kronic-config-secret.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: external-secrets.io/v1 -kind: ExternalSecret -metadata: - name: kronic-config-secret - namespace: kronic - labels: - app.kubernetes.io/name: kronic-config-secret - app.kubernetes.io/instance: kronic - app.kubernetes.io/part-of: kronic -spec: - secretStoreRef: - kind: ClusterSecretStore - name: vault - data: - - secretKey: password - remoteRef: - conversionStrategy: Default - decodingStrategy: None - key: /cl01tl/kronic/auth - metadataPolicy: None - property: password diff --git a/clusters/cl01tl/manifests/kronic/HTTPRoute-https-route-kronic.yaml b/clusters/cl01tl/manifests/kronic/HTTPRoute-https-route-kronic.yaml deleted file mode 100644 index 38868b9d9..000000000 --- a/clusters/cl01tl/manifests/kronic/HTTPRoute-https-route-kronic.yaml +++ /dev/null @@ -1,28 +0,0 @@ -apiVersion: gateway.networking.k8s.io/v1 -kind: HTTPRoute -metadata: - name: https-route-kronic - namespace: kronic - labels: - app.kubernetes.io/name: https-route-kronic - app.kubernetes.io/instance: kronic - app.kubernetes.io/part-of: kronic -spec: - parentRefs: - - group: gateway.networking.k8s.io - kind: Gateway - name: traefik-gateway - namespace: traefik - hostnames: - - kronic.alexlebens.net - rules: - - matches: - - path: - type: PathPrefix - value: / - backendRefs: - - group: '' - kind: Service - name: kronic - port: 80 - weight: 100 diff --git a/clusters/cl01tl/manifests/kronic/Pod-kronic-test-connection.yaml b/clusters/cl01tl/manifests/kronic/Pod-kronic-test-connection.yaml deleted file mode 100644 index 6ad03546f..000000000 --- a/clusters/cl01tl/manifests/kronic/Pod-kronic-test-connection.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: v1 -kind: Pod -metadata: - name: "kronic-test-connection" - labels: - helm.sh/chart: kronic-0.1.7 - app.kubernetes.io/name: kronic - app.kubernetes.io/instance: kronic - app.kubernetes.io/version: "v0.1.4" - app.kubernetes.io/managed-by: Helm - annotations: - "helm.sh/hook": test -spec: - containers: - - name: wget - image: busybox - command: ['wget'] - args: ['kronic:80/healthz'] - restartPolicy: Never diff --git a/clusters/cl01tl/manifests/kronic/Service-kronic.yaml b/clusters/cl01tl/manifests/kronic/Service-kronic.yaml deleted file mode 100644 index 421262ad8..000000000 --- a/clusters/cl01tl/manifests/kronic/Service-kronic.yaml +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: kronic - labels: - helm.sh/chart: kronic-0.1.7 - app.kubernetes.io/name: kronic - app.kubernetes.io/instance: kronic - app.kubernetes.io/version: "v0.1.4" - app.kubernetes.io/managed-by: Helm -spec: - type: ClusterIP - ports: - - port: 80 - targetPort: http - protocol: TCP - name: http - selector: - app.kubernetes.io/name: kronic - app.kubernetes.io/instance: kronic diff --git a/clusters/cl01tl/manifests/kronic/ServiceAccount-kronic.yaml b/clusters/cl01tl/manifests/kronic/ServiceAccount-kronic.yaml deleted file mode 100644 index 792ff50e0..000000000 --- a/clusters/cl01tl/manifests/kronic/ServiceAccount-kronic.yaml +++ /dev/null @@ -1,10 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: kronic - labels: - helm.sh/chart: kronic-0.1.7 - app.kubernetes.io/name: kronic - app.kubernetes.io/instance: kronic - app.kubernetes.io/version: "v0.1.4" - app.kubernetes.io/managed-by: Helm diff --git a/clusters/cl01tl/manifests/kube-prometheus-stack/ExternalSecret-alertmanager-config-secret.yaml b/clusters/cl01tl/manifests/kube-prometheus-stack/ExternalSecret-alertmanager-config-secret.yaml index 68164f7fd..d5ccaefd8 100644 --- a/clusters/cl01tl/manifests/kube-prometheus-stack/ExternalSecret-alertmanager-config-secret.yaml +++ b/clusters/cl01tl/manifests/kube-prometheus-stack/ExternalSecret-alertmanager-config-secret.yaml @@ -12,20 +12,6 @@ spec: kind: ClusterSecretStore name: vault data: - - secretKey: pushover_token - remoteRef: - conversionStrategy: Default - decodingStrategy: None - key: /pushover/key - metadataPolicy: None - property: alertmanager_key - - secretKey: pushover_user_key - remoteRef: - conversionStrategy: Default - decodingStrategy: None - key: /pushover/key - metadataPolicy: None - property: user_key - secretKey: ntfy_password remoteRef: conversionStrategy: Default diff --git a/clusters/cl01tl/manifests/kube-prometheus-stack/Secret-alertmanager-kube-prometheus-stack-alertmanager.yaml b/clusters/cl01tl/manifests/kube-prometheus-stack/Secret-alertmanager-kube-prometheus-stack-alertmanager.yaml index 5389f3bb9..1e73bbbed 100644 --- a/clusters/cl01tl/manifests/kube-prometheus-stack/Secret-alertmanager-kube-prometheus-stack-alertmanager.yaml +++ b/clusters/cl01tl/manifests/kube-prometheus-stack/Secret-alertmanager-kube-prometheus-stack-alertmanager.yaml @@ -13,4 +13,4 @@ metadata: release: "kube-prometheus-stack" heritage: "Helm" data: - alertmanager.yaml: "Z2xvYmFsOgogIHJlc29sdmVfdGltZW91dDogNW0KaW5oaWJpdF9ydWxlczoKLSBlcXVhbDoKICAtIG5hbWVzcGFjZQogIC0gYWxlcnRuYW1lCiAgc291cmNlX21hdGNoZXJzOgogIC0gc2V2ZXJpdHkgPSBjcml0aWNhbAogIHRhcmdldF9tYXRjaGVyczoKICAtIHNldmVyaXR5ID1+IHdhcm5pbmd8aW5mbwotIGVxdWFsOgogIC0gbmFtZXNwYWNlCiAgLSBhbGVydG5hbWUKICBzb3VyY2VfbWF0Y2hlcnM6CiAgLSBzZXZlcml0eSA9IHdhcm5pbmcKICB0YXJnZXRfbWF0Y2hlcnM6CiAgLSBzZXZlcml0eSA9IGluZm8KLSBlcXVhbDoKICAtIG5hbWVzcGFjZQogIHNvdXJjZV9tYXRjaGVyczoKICAtIGFsZXJ0bmFtZSA9IEluZm9JbmhpYml0b3IKICB0YXJnZXRfbWF0Y2hlcnM6CiAgLSBzZXZlcml0eSA9IGluZm8KLSB0YXJnZXRfbWF0Y2hlcnM6CiAgLSBhbGVydG5hbWUgPSBJbmZvSW5oaWJpdG9yCnJlY2VpdmVyczoKLSBuYW1lOiBwdXNob3ZlcgogIHB1c2hvdmVyX2NvbmZpZ3M6CiAgLSBzZW5kX3Jlc29sdmVkOiB0cnVlCiAgICB0b2tlbl9maWxlOiAvZXRjL2FsZXJ0bWFuYWdlci9zZWNyZXRzL2FsZXJ0bWFuYWdlci1jb25maWctc2VjcmV0L3B1c2hvdmVyX3Rva2VuCiAgICB1c2VyX2tleV9maWxlOiAvZXRjL2FsZXJ0bWFuYWdlci9zZWNyZXRzL2FsZXJ0bWFuYWdlci1jb25maWctc2VjcmV0L3B1c2hvdmVyX3VzZXJfa2V5Ci0gbmFtZTogbnRmeQogIHdlYmhvb2tfY29uZmlnczoKICAtIGh0dHBfY29uZmlnOgogICAgICBiYXNpY19hdXRoOgogICAgICAgIHBhc3N3b3JkX2ZpbGU6IC9ldGMvYWxlcnRtYW5hZ2VyL3NlY3JldHMvYWxlcnRtYW5hZ2VyLWNvbmZpZy1zZWNyZXQvbnRmeV9wYXNzd29yZAogICAgICAgIHVzZXJuYW1lOiBudGZ5LWFsZXJ0bWFuYWdlcgogICAgdXJsOiBodHRwOi8vbnRmeS1hbGVydG1hbmFnZXIua3ViZS1wcm9tZXRoZXVzLXN0YWNrOjgwCnJvdXRlOgogIGdyb3VwX2J5OgogIC0gbmFtZXNwYWNlCiAgLSBhbGVydG5hbWUKICBncm91cF9pbnRlcnZhbDogNW0KICBncm91cF93YWl0OiAzMHMKICByZWNlaXZlcjogbnRmeQogIHJlcGVhdF9pbnRlcnZhbDogMjRoCiAgcm91dGVzOgogIC0gZ3JvdXBfaW50ZXJ2YWw6IDVtCiAgICBncm91cF93YWl0OiAxMHMKICAgIHJlY2VpdmVyOiBudGZ5CiAgICByZXBlYXRfaW50ZXJ2YWw6IDI0aAp0ZW1wbGF0ZXM6Ci0gL2V0Yy9hbGVydG1hbmFnZXIvY29uZmlnLyoudG1wbA==" + alertmanager.yaml: "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"