Automated Manifest Update (#2453)

This PR contains newly rendered Kubernetes manifests automatically generated by the CI workflow.

Reviewed-on: #2453
Co-authored-by: gitea-bot <gitea-bot@alexlebens.net>
Co-committed-by: gitea-bot <gitea-bot@alexlebens.net>
This commit was merged in pull request #2453.
This commit is contained in:
2025-12-12 22:22:13 +00:00
committed by Alex Lebens
parent a62418ee93
commit 8e275f5b6b
16 changed files with 4 additions and 243 deletions

View File

@@ -119,7 +119,6 @@ data:
jellystat IN CNAME traefik-cl01tl jellystat IN CNAME traefik-cl01tl
kiwix IN CNAME traefik-cl01tl kiwix IN CNAME traefik-cl01tl
komodo IN CNAME traefik-cl01tl komodo IN CNAME traefik-cl01tl
kronic IN CNAME traefik-cl01tl
lidarr IN CNAME traefik-cl01tl lidarr IN CNAME traefik-cl01tl
lidatube IN CNAME traefik-cl01tl lidatube IN CNAME traefik-cl01tl
listenarr IN CNAME traefik-cl01tl listenarr IN CNAME traefik-cl01tl

View File

@@ -22,7 +22,7 @@ spec:
template: template:
metadata: metadata:
annotations: annotations:
checksum/configMaps: 0e833e54799f5b97aed8f29e4ab15bcaec039a2bbfb88bdb0b45ad1b97c1148e checksum/configMaps: a0d9f2795d2d2013805f4996524f6a29bfa2576e1c3633068b6f011e9648b2e0
labels: labels:
app.kubernetes.io/controller: main app.kubernetes.io/controller: main
app.kubernetes.io/instance: blocky app.kubernetes.io/instance: blocky

View File

@@ -231,14 +231,6 @@ data:
interval: 30s interval: 30s
name: n8n name: n8n
url: https://n8n.alexlebens.net url: https://n8n.alexlebens.net
- alerts:
- type: ntfy
conditions:
- '[STATUS] == 401'
group: core
interval: 30s
name: kronic
url: https://kronic.alexlebens.net
- alerts: - alerts:
- type: ntfy - type: ntfy
conditions: conditions:

View File

@@ -26,7 +26,7 @@ spec:
app.kubernetes.io/name: gatus app.kubernetes.io/name: gatus
app.kubernetes.io/instance: gatus app.kubernetes.io/instance: gatus
annotations: annotations:
checksum/config: 46a5f9507de33e28db7c4eb9bf27bd9f37c375a647cde6a81cffe037692377f2 checksum/config: 0a23a7fc337d39aea7dea5f7cb496e32467bf2856b90e3a0283ee49684422298
spec: spec:
serviceAccountName: default serviceAccountName: default
automountServiceAccountToken: false automountServiceAccountToken: false

View File

@@ -270,12 +270,6 @@ data:
href: https://n8n.alexlebens.net href: https://n8n.alexlebens.net
siteMonitor: http://n8n-main.n8n:80 siteMonitor: http://n8n-main.n8n:80
statusStyle: dot statusStyle: dot
- Jobs:
icon: https://raw.githubusercontent.com/mshade/kronic/main/static/android-chrome-192x192.png
description: Kronic
href: https://kronic.alexlebens.net
siteMonitor: http://kronic.kronic:80
statusStyle: dot
- Uptime: - Uptime:
icon: sh-gatus.webp icon: sh-gatus.webp
description: Gatus description: Gatus

View File

@@ -24,7 +24,7 @@ spec:
template: template:
metadata: metadata:
annotations: annotations:
checksum/configMaps: aa2e66e21f5f316af1bcb1030b3c63972c06858c45f340911c2727af9f4053d3 checksum/configMaps: 45df1f089469334856418ad71a92e7aab49a18e2a0f222c66fcaebce3eac35c8
checksum/secrets: d3ba83f111cd32f92c909268c55ad8bbd4f9e299b74b35b33c1a011180d8b378 checksum/secrets: d3ba83f111cd32f92c909268c55ad8bbd4f9e299b74b35b33c1a011180d8b378
labels: labels:
app.kubernetes.io/controller: main app.kubernetes.io/controller: main

View File

@@ -1,30 +0,0 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
helm.sh/chart: kronic-0.1.7
app.kubernetes.io/name: kronic
app.kubernetes.io/instance: kronic
app.kubernetes.io/version: "v0.1.4"
app.kubernetes.io/managed-by: Helm
name: kronic
rules:
- apiGroups:
- ""
resources:
- pods
- events
- pods/log
- namespaces
verbs:
- get
- list
- watch
- apiGroups:
- batch
resources:
- jobs
- cronjobs
- cronjobs/status
verbs:
- "*"

View File

@@ -1,18 +0,0 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
helm.sh/chart: kronic-0.1.7
app.kubernetes.io/name: kronic
app.kubernetes.io/instance: kronic
app.kubernetes.io/version: "v0.1.4"
app.kubernetes.io/managed-by: Helm
name: kronic
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kronic
subjects:
- kind: ServiceAccount
name: kronic
namespace: "kronic"

View File

@@ -1,64 +0,0 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: kronic
labels:
helm.sh/chart: kronic-0.1.7
app.kubernetes.io/name: kronic
app.kubernetes.io/instance: kronic
app.kubernetes.io/version: "v0.1.4"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/name: kronic
app.kubernetes.io/instance: kronic
template:
metadata:
labels:
app.kubernetes.io/name: kronic
app.kubernetes.io/instance: kronic
spec:
serviceAccountName: kronic
securityContext: {}
containers:
- name: kronic
securityContext: {}
image: "ghcr.io/mshade/kronic:v0.1.4"
imagePullPolicy: IfNotPresent
env:
- name: KRONIC_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: KRONIC_ADMIN_PASSWORD
valueFrom:
secretKeyRef:
name: kronic-config-secret
key: password
- name: KRONIC_ADMIN_USERNAME
value: "kronic"
- name: KRONIC_ALLOW_NAMESPACES
value: "gitea,vault,talos,libation,kubernetes-cloudflare-ddns"
- name: KRONIC_NAMESPACE_ONLY
value: ""
ports:
- name: http
containerPort: 8000
protocol: TCP
livenessProbe:
httpGet:
path: /healthz
port: http
readinessProbe:
httpGet:
path: /healthz
port: http
resources:
limits:
cpu: 1
memory: 1024Mi
requests:
cpu: 10m
memory: 256Mi

View File

@@ -1,21 +0,0 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: kronic-config-secret
namespace: kronic
labels:
app.kubernetes.io/name: kronic-config-secret
app.kubernetes.io/instance: kronic
app.kubernetes.io/part-of: kronic
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
data:
- secretKey: password
remoteRef:
conversionStrategy: Default
decodingStrategy: None
key: /cl01tl/kronic/auth
metadataPolicy: None
property: password

View File

@@ -1,28 +0,0 @@
apiVersion: gateway.networking.k8s.io/v1
kind: HTTPRoute
metadata:
name: https-route-kronic
namespace: kronic
labels:
app.kubernetes.io/name: https-route-kronic
app.kubernetes.io/instance: kronic
app.kubernetes.io/part-of: kronic
spec:
parentRefs:
- group: gateway.networking.k8s.io
kind: Gateway
name: traefik-gateway
namespace: traefik
hostnames:
- kronic.alexlebens.net
rules:
- matches:
- path:
type: PathPrefix
value: /
backendRefs:
- group: ''
kind: Service
name: kronic
port: 80
weight: 100

View File

@@ -1,19 +0,0 @@
apiVersion: v1
kind: Pod
metadata:
name: "kronic-test-connection"
labels:
helm.sh/chart: kronic-0.1.7
app.kubernetes.io/name: kronic
app.kubernetes.io/instance: kronic
app.kubernetes.io/version: "v0.1.4"
app.kubernetes.io/managed-by: Helm
annotations:
"helm.sh/hook": test
spec:
containers:
- name: wget
image: busybox
command: ['wget']
args: ['kronic:80/healthz']
restartPolicy: Never

View File

@@ -1,20 +0,0 @@
apiVersion: v1
kind: Service
metadata:
name: kronic
labels:
helm.sh/chart: kronic-0.1.7
app.kubernetes.io/name: kronic
app.kubernetes.io/instance: kronic
app.kubernetes.io/version: "v0.1.4"
app.kubernetes.io/managed-by: Helm
spec:
type: ClusterIP
ports:
- port: 80
targetPort: http
protocol: TCP
name: http
selector:
app.kubernetes.io/name: kronic
app.kubernetes.io/instance: kronic

View File

@@ -1,10 +0,0 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: kronic
labels:
helm.sh/chart: kronic-0.1.7
app.kubernetes.io/name: kronic
app.kubernetes.io/instance: kronic
app.kubernetes.io/version: "v0.1.4"
app.kubernetes.io/managed-by: Helm

View File

@@ -12,20 +12,6 @@ spec:
kind: ClusterSecretStore kind: ClusterSecretStore
name: vault name: vault
data: data:
- secretKey: pushover_token
remoteRef:
conversionStrategy: Default
decodingStrategy: None
key: /pushover/key
metadataPolicy: None
property: alertmanager_key
- secretKey: pushover_user_key
remoteRef:
conversionStrategy: Default
decodingStrategy: None
key: /pushover/key
metadataPolicy: None
property: user_key
- secretKey: ntfy_password - secretKey: ntfy_password
remoteRef: remoteRef:
conversionStrategy: Default conversionStrategy: Default

View File

@@ -13,4 +13,4 @@ metadata:
release: "kube-prometheus-stack" release: "kube-prometheus-stack"
heritage: "Helm" heritage: "Helm"
data: data:
alertmanager.yaml: "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" alertmanager.yaml: "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"