Automated Manifest Update (#2453)
This PR contains newly rendered Kubernetes manifests automatically generated by the CI workflow. Reviewed-on: #2453 Co-authored-by: gitea-bot <gitea-bot@alexlebens.net> Co-committed-by: gitea-bot <gitea-bot@alexlebens.net>
This commit was merged in pull request #2453.
This commit is contained in:
@@ -119,7 +119,6 @@ data:
|
|||||||
jellystat IN CNAME traefik-cl01tl
|
jellystat IN CNAME traefik-cl01tl
|
||||||
kiwix IN CNAME traefik-cl01tl
|
kiwix IN CNAME traefik-cl01tl
|
||||||
komodo IN CNAME traefik-cl01tl
|
komodo IN CNAME traefik-cl01tl
|
||||||
kronic IN CNAME traefik-cl01tl
|
|
||||||
lidarr IN CNAME traefik-cl01tl
|
lidarr IN CNAME traefik-cl01tl
|
||||||
lidatube IN CNAME traefik-cl01tl
|
lidatube IN CNAME traefik-cl01tl
|
||||||
listenarr IN CNAME traefik-cl01tl
|
listenarr IN CNAME traefik-cl01tl
|
||||||
|
|||||||
@@ -22,7 +22,7 @@ spec:
|
|||||||
template:
|
template:
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
annotations:
|
||||||
checksum/configMaps: 0e833e54799f5b97aed8f29e4ab15bcaec039a2bbfb88bdb0b45ad1b97c1148e
|
checksum/configMaps: a0d9f2795d2d2013805f4996524f6a29bfa2576e1c3633068b6f011e9648b2e0
|
||||||
labels:
|
labels:
|
||||||
app.kubernetes.io/controller: main
|
app.kubernetes.io/controller: main
|
||||||
app.kubernetes.io/instance: blocky
|
app.kubernetes.io/instance: blocky
|
||||||
|
|||||||
@@ -231,14 +231,6 @@ data:
|
|||||||
interval: 30s
|
interval: 30s
|
||||||
name: n8n
|
name: n8n
|
||||||
url: https://n8n.alexlebens.net
|
url: https://n8n.alexlebens.net
|
||||||
- alerts:
|
|
||||||
- type: ntfy
|
|
||||||
conditions:
|
|
||||||
- '[STATUS] == 401'
|
|
||||||
group: core
|
|
||||||
interval: 30s
|
|
||||||
name: kronic
|
|
||||||
url: https://kronic.alexlebens.net
|
|
||||||
- alerts:
|
- alerts:
|
||||||
- type: ntfy
|
- type: ntfy
|
||||||
conditions:
|
conditions:
|
||||||
|
|||||||
@@ -26,7 +26,7 @@ spec:
|
|||||||
app.kubernetes.io/name: gatus
|
app.kubernetes.io/name: gatus
|
||||||
app.kubernetes.io/instance: gatus
|
app.kubernetes.io/instance: gatus
|
||||||
annotations:
|
annotations:
|
||||||
checksum/config: 46a5f9507de33e28db7c4eb9bf27bd9f37c375a647cde6a81cffe037692377f2
|
checksum/config: 0a23a7fc337d39aea7dea5f7cb496e32467bf2856b90e3a0283ee49684422298
|
||||||
spec:
|
spec:
|
||||||
serviceAccountName: default
|
serviceAccountName: default
|
||||||
automountServiceAccountToken: false
|
automountServiceAccountToken: false
|
||||||
|
|||||||
@@ -270,12 +270,6 @@ data:
|
|||||||
href: https://n8n.alexlebens.net
|
href: https://n8n.alexlebens.net
|
||||||
siteMonitor: http://n8n-main.n8n:80
|
siteMonitor: http://n8n-main.n8n:80
|
||||||
statusStyle: dot
|
statusStyle: dot
|
||||||
- Jobs:
|
|
||||||
icon: https://raw.githubusercontent.com/mshade/kronic/main/static/android-chrome-192x192.png
|
|
||||||
description: Kronic
|
|
||||||
href: https://kronic.alexlebens.net
|
|
||||||
siteMonitor: http://kronic.kronic:80
|
|
||||||
statusStyle: dot
|
|
||||||
- Uptime:
|
- Uptime:
|
||||||
icon: sh-gatus.webp
|
icon: sh-gatus.webp
|
||||||
description: Gatus
|
description: Gatus
|
||||||
|
|||||||
@@ -24,7 +24,7 @@ spec:
|
|||||||
template:
|
template:
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
annotations:
|
||||||
checksum/configMaps: aa2e66e21f5f316af1bcb1030b3c63972c06858c45f340911c2727af9f4053d3
|
checksum/configMaps: 45df1f089469334856418ad71a92e7aab49a18e2a0f222c66fcaebce3eac35c8
|
||||||
checksum/secrets: d3ba83f111cd32f92c909268c55ad8bbd4f9e299b74b35b33c1a011180d8b378
|
checksum/secrets: d3ba83f111cd32f92c909268c55ad8bbd4f9e299b74b35b33c1a011180d8b378
|
||||||
labels:
|
labels:
|
||||||
app.kubernetes.io/controller: main
|
app.kubernetes.io/controller: main
|
||||||
|
|||||||
@@ -1,30 +0,0 @@
|
|||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
kind: ClusterRole
|
|
||||||
metadata:
|
|
||||||
labels:
|
|
||||||
helm.sh/chart: kronic-0.1.7
|
|
||||||
app.kubernetes.io/name: kronic
|
|
||||||
app.kubernetes.io/instance: kronic
|
|
||||||
app.kubernetes.io/version: "v0.1.4"
|
|
||||||
app.kubernetes.io/managed-by: Helm
|
|
||||||
name: kronic
|
|
||||||
rules:
|
|
||||||
- apiGroups:
|
|
||||||
- ""
|
|
||||||
resources:
|
|
||||||
- pods
|
|
||||||
- events
|
|
||||||
- pods/log
|
|
||||||
- namespaces
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
- list
|
|
||||||
- watch
|
|
||||||
- apiGroups:
|
|
||||||
- batch
|
|
||||||
resources:
|
|
||||||
- jobs
|
|
||||||
- cronjobs
|
|
||||||
- cronjobs/status
|
|
||||||
verbs:
|
|
||||||
- "*"
|
|
||||||
@@ -1,18 +0,0 @@
|
|||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
kind: ClusterRoleBinding
|
|
||||||
metadata:
|
|
||||||
labels:
|
|
||||||
helm.sh/chart: kronic-0.1.7
|
|
||||||
app.kubernetes.io/name: kronic
|
|
||||||
app.kubernetes.io/instance: kronic
|
|
||||||
app.kubernetes.io/version: "v0.1.4"
|
|
||||||
app.kubernetes.io/managed-by: Helm
|
|
||||||
name: kronic
|
|
||||||
roleRef:
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
||||||
kind: ClusterRole
|
|
||||||
name: kronic
|
|
||||||
subjects:
|
|
||||||
- kind: ServiceAccount
|
|
||||||
name: kronic
|
|
||||||
namespace: "kronic"
|
|
||||||
@@ -1,64 +0,0 @@
|
|||||||
apiVersion: apps/v1
|
|
||||||
kind: Deployment
|
|
||||||
metadata:
|
|
||||||
name: kronic
|
|
||||||
labels:
|
|
||||||
helm.sh/chart: kronic-0.1.7
|
|
||||||
app.kubernetes.io/name: kronic
|
|
||||||
app.kubernetes.io/instance: kronic
|
|
||||||
app.kubernetes.io/version: "v0.1.4"
|
|
||||||
app.kubernetes.io/managed-by: Helm
|
|
||||||
spec:
|
|
||||||
replicas: 1
|
|
||||||
selector:
|
|
||||||
matchLabels:
|
|
||||||
app.kubernetes.io/name: kronic
|
|
||||||
app.kubernetes.io/instance: kronic
|
|
||||||
template:
|
|
||||||
metadata:
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: kronic
|
|
||||||
app.kubernetes.io/instance: kronic
|
|
||||||
spec:
|
|
||||||
serviceAccountName: kronic
|
|
||||||
securityContext: {}
|
|
||||||
containers:
|
|
||||||
- name: kronic
|
|
||||||
securityContext: {}
|
|
||||||
image: "ghcr.io/mshade/kronic:v0.1.4"
|
|
||||||
imagePullPolicy: IfNotPresent
|
|
||||||
env:
|
|
||||||
- name: KRONIC_NAMESPACE
|
|
||||||
valueFrom:
|
|
||||||
fieldRef:
|
|
||||||
fieldPath: metadata.namespace
|
|
||||||
- name: KRONIC_ADMIN_PASSWORD
|
|
||||||
valueFrom:
|
|
||||||
secretKeyRef:
|
|
||||||
name: kronic-config-secret
|
|
||||||
key: password
|
|
||||||
- name: KRONIC_ADMIN_USERNAME
|
|
||||||
value: "kronic"
|
|
||||||
- name: KRONIC_ALLOW_NAMESPACES
|
|
||||||
value: "gitea,vault,talos,libation,kubernetes-cloudflare-ddns"
|
|
||||||
- name: KRONIC_NAMESPACE_ONLY
|
|
||||||
value: ""
|
|
||||||
ports:
|
|
||||||
- name: http
|
|
||||||
containerPort: 8000
|
|
||||||
protocol: TCP
|
|
||||||
livenessProbe:
|
|
||||||
httpGet:
|
|
||||||
path: /healthz
|
|
||||||
port: http
|
|
||||||
readinessProbe:
|
|
||||||
httpGet:
|
|
||||||
path: /healthz
|
|
||||||
port: http
|
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
cpu: 1
|
|
||||||
memory: 1024Mi
|
|
||||||
requests:
|
|
||||||
cpu: 10m
|
|
||||||
memory: 256Mi
|
|
||||||
@@ -1,21 +0,0 @@
|
|||||||
apiVersion: external-secrets.io/v1
|
|
||||||
kind: ExternalSecret
|
|
||||||
metadata:
|
|
||||||
name: kronic-config-secret
|
|
||||||
namespace: kronic
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: kronic-config-secret
|
|
||||||
app.kubernetes.io/instance: kronic
|
|
||||||
app.kubernetes.io/part-of: kronic
|
|
||||||
spec:
|
|
||||||
secretStoreRef:
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
name: vault
|
|
||||||
data:
|
|
||||||
- secretKey: password
|
|
||||||
remoteRef:
|
|
||||||
conversionStrategy: Default
|
|
||||||
decodingStrategy: None
|
|
||||||
key: /cl01tl/kronic/auth
|
|
||||||
metadataPolicy: None
|
|
||||||
property: password
|
|
||||||
@@ -1,28 +0,0 @@
|
|||||||
apiVersion: gateway.networking.k8s.io/v1
|
|
||||||
kind: HTTPRoute
|
|
||||||
metadata:
|
|
||||||
name: https-route-kronic
|
|
||||||
namespace: kronic
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: https-route-kronic
|
|
||||||
app.kubernetes.io/instance: kronic
|
|
||||||
app.kubernetes.io/part-of: kronic
|
|
||||||
spec:
|
|
||||||
parentRefs:
|
|
||||||
- group: gateway.networking.k8s.io
|
|
||||||
kind: Gateway
|
|
||||||
name: traefik-gateway
|
|
||||||
namespace: traefik
|
|
||||||
hostnames:
|
|
||||||
- kronic.alexlebens.net
|
|
||||||
rules:
|
|
||||||
- matches:
|
|
||||||
- path:
|
|
||||||
type: PathPrefix
|
|
||||||
value: /
|
|
||||||
backendRefs:
|
|
||||||
- group: ''
|
|
||||||
kind: Service
|
|
||||||
name: kronic
|
|
||||||
port: 80
|
|
||||||
weight: 100
|
|
||||||
@@ -1,19 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: Pod
|
|
||||||
metadata:
|
|
||||||
name: "kronic-test-connection"
|
|
||||||
labels:
|
|
||||||
helm.sh/chart: kronic-0.1.7
|
|
||||||
app.kubernetes.io/name: kronic
|
|
||||||
app.kubernetes.io/instance: kronic
|
|
||||||
app.kubernetes.io/version: "v0.1.4"
|
|
||||||
app.kubernetes.io/managed-by: Helm
|
|
||||||
annotations:
|
|
||||||
"helm.sh/hook": test
|
|
||||||
spec:
|
|
||||||
containers:
|
|
||||||
- name: wget
|
|
||||||
image: busybox
|
|
||||||
command: ['wget']
|
|
||||||
args: ['kronic:80/healthz']
|
|
||||||
restartPolicy: Never
|
|
||||||
@@ -1,20 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: Service
|
|
||||||
metadata:
|
|
||||||
name: kronic
|
|
||||||
labels:
|
|
||||||
helm.sh/chart: kronic-0.1.7
|
|
||||||
app.kubernetes.io/name: kronic
|
|
||||||
app.kubernetes.io/instance: kronic
|
|
||||||
app.kubernetes.io/version: "v0.1.4"
|
|
||||||
app.kubernetes.io/managed-by: Helm
|
|
||||||
spec:
|
|
||||||
type: ClusterIP
|
|
||||||
ports:
|
|
||||||
- port: 80
|
|
||||||
targetPort: http
|
|
||||||
protocol: TCP
|
|
||||||
name: http
|
|
||||||
selector:
|
|
||||||
app.kubernetes.io/name: kronic
|
|
||||||
app.kubernetes.io/instance: kronic
|
|
||||||
@@ -1,10 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: ServiceAccount
|
|
||||||
metadata:
|
|
||||||
name: kronic
|
|
||||||
labels:
|
|
||||||
helm.sh/chart: kronic-0.1.7
|
|
||||||
app.kubernetes.io/name: kronic
|
|
||||||
app.kubernetes.io/instance: kronic
|
|
||||||
app.kubernetes.io/version: "v0.1.4"
|
|
||||||
app.kubernetes.io/managed-by: Helm
|
|
||||||
@@ -12,20 +12,6 @@ spec:
|
|||||||
kind: ClusterSecretStore
|
kind: ClusterSecretStore
|
||||||
name: vault
|
name: vault
|
||||||
data:
|
data:
|
||||||
- secretKey: pushover_token
|
|
||||||
remoteRef:
|
|
||||||
conversionStrategy: Default
|
|
||||||
decodingStrategy: None
|
|
||||||
key: /pushover/key
|
|
||||||
metadataPolicy: None
|
|
||||||
property: alertmanager_key
|
|
||||||
- secretKey: pushover_user_key
|
|
||||||
remoteRef:
|
|
||||||
conversionStrategy: Default
|
|
||||||
decodingStrategy: None
|
|
||||||
key: /pushover/key
|
|
||||||
metadataPolicy: None
|
|
||||||
property: user_key
|
|
||||||
- secretKey: ntfy_password
|
- secretKey: ntfy_password
|
||||||
remoteRef:
|
remoteRef:
|
||||||
conversionStrategy: Default
|
conversionStrategy: Default
|
||||||
|
|||||||
@@ -13,4 +13,4 @@ metadata:
|
|||||||
release: "kube-prometheus-stack"
|
release: "kube-prometheus-stack"
|
||||||
heritage: "Helm"
|
heritage: "Helm"
|
||||||
data:
|
data:
|
||||||
alertmanager.yaml: "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"
|
alertmanager.yaml: "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"
|
||||||
|
|||||||
Reference in New Issue
Block a user