chore: Update manifests after change

This commit is contained in:
2026-04-24 00:11:38 +00:00
parent cfe38d32cf
commit ba20a96b0f
233 changed files with 1471 additions and 1345 deletions

View File

@@ -16,9 +16,13 @@ spec:
mergePolicy: Merge
engineVersion: v2
data:
ntfy-url: "{{ .endpoint }}/audiobookshelf"
ntfy-url: "{{ .endpoint }}/{{ .topic }}"
data:
- secretKey: endpoint
remoteRef:
key: /cl01tl/ntfy/users/cl01tl
property: internal-endpoint-credential
- secretKey: topic
remoteRef:
key: /cl01tl/ntfy/topics
property: audiobookshelf

View File

@@ -5,9 +5,9 @@ metadata:
namespace: authentik
labels:
app.kubernetes.io/name: authentik-tailscale
tailscale.com/proxy-class: no-metrics
app.kubernetes.io/instance: authentik
app.kubernetes.io/part-of: authentik
tailscale.com/proxy-class: no-metrics
annotations:
tailscale.com/experimental-forward-cluster-traffic-via-ingress: "true"
spec:
@@ -26,4 +26,4 @@ spec:
service:
name: authentik-server
port:
number: 80
name: http

View File

@@ -21,8 +21,6 @@ spec:
type: PathPrefix
value: /
backendRefs:
- group: ''
kind: Service
- kind: Service
name: hubble-ui
port: 80
weight: 100

View File

@@ -205,7 +205,7 @@ spec:
type: Directory
- name: config
secret:
secretName: synology-iscsi-config-secret
secretName: synology-iscsi-config
- name: extra-ca-certs
configMap:
name: democratic-csi-synology-iscsi

View File

@@ -178,7 +178,7 @@ spec:
emptyDir: {}
- name: config
secret:
secretName: synology-iscsi-config-secret
secretName: synology-iscsi-config
- name: extra-ca-certs
configMap:
name: democratic-csi-synology-iscsi

View File

@@ -1,16 +1,16 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: synology-iscsi-config-secret
name: synology-iscsi-config
namespace: democratic-csi-synology-iscsi
labels:
app.kubernetes.io/name: synology-iscsi-config-secret
app.kubernetes.io/name: synology-iscsi-config
app.kubernetes.io/instance: democratic-csi-synology-iscsi
app.kubernetes.io/part-of: democratic-csi-synology-iscsi
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: driver-config-file.yaml
remoteRef:

View File

@@ -139,12 +139,12 @@ spec:
valueFrom:
secretKeyRef:
key: OIDC_CLIENT_ID
name: directus-oidc-secret
name: directus-oidc-authentik
- name: AUTH_AUTHENTIK_CLIENT_SECRET
valueFrom:
secretKeyRef:
key: OIDC_CLIENT_SECRET
name: directus-oidc-secret
name: directus-oidc-authentik
- name: AUTH_AUTHENTIK_SCOPE
value: openid profile email
- name: AUTH_AUTHENTIK_ISSUER_URL

View File

@@ -10,7 +10,7 @@ metadata:
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: ACCESS_KEY_ID
remoteRef:

View File

@@ -10,8 +10,16 @@ metadata:
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: key
remoteRef:
key: /cl01tl/directus/key
property: key
- secretKey: secret
remoteRef:
key: /cl01tl/directus/key
property: secret
- secretKey: admin-email
remoteRef:
key: /cl01tl/directus/config
@@ -20,11 +28,3 @@ spec:
remoteRef:
key: /cl01tl/directus/config
property: admin-password
- secretKey: secret
remoteRef:
key: /cl01tl/directus/config
property: secret
- secretKey: key
remoteRef:
key: /cl01tl/directus/config
property: key

View File

@@ -10,7 +10,7 @@ metadata:
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: metric-token
remoteRef:

View File

@@ -1,22 +1,22 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: directus-oidc-secret
name: directus-oidc-authentik
namespace: directus
labels:
app.kubernetes.io/name: directus-oidc-secret
app.kubernetes.io/name: directus-oidc-authentik
app.kubernetes.io/instance: directus
app.kubernetes.io/part-of: directus
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: OIDC_CLIENT_ID
remoteRef:
key: /authentik/oidc/directus
key: /cl01tl/authentik/oidc/directus
property: client
- secretKey: OIDC_CLIENT_SECRET
remoteRef:
key: /authentik/oidc/directus
key: /cl01tl/authentik/oidc/directus
property: secret

View File

@@ -10,12 +10,8 @@ metadata:
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: default
remoteRef:
key: /cl01tl/directus/valkey
property: password
- secretKey: user
remoteRef:
key: /cl01tl/directus/valkey
@@ -24,3 +20,7 @@ spec:
remoteRef:
key: /cl01tl/directus/valkey
property: password
- secretKey: default
remoteRef:
key: /cl01tl/directus/valkey
property: password

View File

@@ -34,3 +34,13 @@ spec:
recordType: A
targets:
- 10.230.0.100
- dnsName: dv01hr.alexlebens.net
recordTTL: 180
recordType: A
targets:
- 10.232.1.72
- dnsName: dv02kv.alexlebens.net
recordTTL: 180
recordType: A
targets:
- 10.232.1.71

View File

@@ -34,3 +34,13 @@ spec:
recordType: A
targets:
- 10.232.1.52
- dnsName: pd05wd.alexlebens.net
recordTTL: 180
recordType: A
targets:
- 10.230.0.115
- dnsName: pl02mc.alexlebens.net
recordTTL: 180
recordType: A
targets:
- 10.230.0.105

View File

@@ -10,7 +10,7 @@ metadata:
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: api-key
remoteRef:

View File

@@ -98,9 +98,9 @@ spec:
value: preferred_username
envFrom:
- secretRef:
name: freshrss-oidc-secret
name: freshrss-oidc-authentik
- secretRef:
name: freshrss-install-secret
name: freshrss-install-config
image: freshrss/freshrss:1.28.1@sha256:9100f649f5c946f589f54cdb9be7a65996528f48f691ef90eb262a0e06e5a522
name: main
resources:

View File

@@ -1,26 +1,26 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: freshrss-install-secret
name: freshrss-install-config
namespace: freshrss
labels:
app.kubernetes.io/name: freshrss-install-secret
app.kubernetes.io/name: freshrss-install-config
app.kubernetes.io/instance: freshrss
app.kubernetes.io/part-of: freshrss
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: ADMIN_EMAIL
remoteRef:
key: /cl01tl/freshrss/config
property: ADMIN_EMAIL
property: admin-email
- secretKey: ADMIN_PASSWORD
remoteRef:
key: /cl01tl/freshrss/config
property: ADMIN_PASSWORD
property: admin-password
- secretKey: ADMIN_API_PASSWORD
remoteRef:
key: /cl01tl/freshrss/config
property: ADMIN_API_PASSWORD
property: admin-api-password

View File

@@ -1,26 +1,26 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: freshrss-oidc-secret
name: freshrss-oidc-authentik
namespace: freshrss
labels:
app.kubernetes.io/name: freshrss-oidc-secret
app.kubernetes.io/name: freshrss-oidc-authentik
app.kubernetes.io/instance: freshrss
app.kubernetes.io/part-of: freshrss
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: OIDC_CLIENT_ID
remoteRef:
key: /authentik/oidc/freshrss
key: /cl01tl/authentik/oidc/freshrss
property: client
- secretKey: OIDC_CLIENT_SECRET
remoteRef:
key: /authentik/oidc/freshrss
key: /cl01tl/authentik/oidc/freshrss
property: secret
- secretKey: OIDC_CLIENT_CRYPTO_KEY
remoteRef:
key: /authentik/oidc/freshrss
property: crypto-key
key: /cl01tl/freshrss/key
property: oidc-client-crypto-key

View File

@@ -49,7 +49,7 @@ spec:
containers:
- envFrom:
- secretRef:
name: garage-token-secret
name: garage-token
image: dxflrs/garage:v2.3.0@sha256:866bd13ed2038ba7e7190e840482bc27234c4afaf77be8cfa439ae088c1e4690
name: main
resources:

View File

@@ -49,7 +49,7 @@ spec:
containers:
- envFrom:
- secretRef:
name: garage-token-secret
name: garage-token
image: dxflrs/garage:v2.3.0@sha256:866bd13ed2038ba7e7190e840482bc27234c4afaf77be8cfa439ae088c1e4690
name: main
resources:

View File

@@ -49,7 +49,7 @@ spec:
containers:
- envFrom:
- secretRef:
name: garage-token-secret
name: garage-token
image: dxflrs/garage:v2.3.0@sha256:866bd13ed2038ba7e7190e840482bc27234c4afaf77be8cfa439ae088c1e4690
name: main
resources:

View File

@@ -45,7 +45,7 @@ spec:
valueFrom:
secretKeyRef:
key: GARAGE_ADMIN_TOKEN
name: garage-token-secret
name: garage-token
image: khairul169/garage-webui:1.1.0@sha256:17c793551873155065bf9a022dabcde874de808a1f26e648d4b82e168806439c
name: main
resources:

View File

@@ -1,26 +1,26 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: garage-token-secret
name: garage-token
namespace: garage
labels:
app.kubernetes.io/name: garage-token-secret
app.kubernetes.io/name: garage-token
app.kubernetes.io/instance: garage
app.kubernetes.io/part-of: garage
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: GARAGE_RPC_SECRET
remoteRef:
key: /cl01tl/garage/token
property: rpc
key: /cl01tl/garage/config
property: rpc-secret
- secretKey: GARAGE_ADMIN_TOKEN
remoteRef:
key: /cl01tl/garage/token
property: admin
key: /cl01tl/garage/config
property: admin-token
- secretKey: GARAGE_METRICS_TOKEN
remoteRef:
key: /cl01tl/garage/token
property: metric
key: /cl01tl/garage/config
property: metrics-token

View File

@@ -27,6 +27,6 @@ spec:
protocol: TCP
targetPort: 3902
selector:
app.kubernetes.io/instance: garage
app.kubernetes.io/name: garage
app.kubernetes.io/instance: garage
garage-type: server

View File

@@ -21,7 +21,7 @@ spec:
endpoints:
- bearerTokenSecret:
key: GARAGE_METRICS_TOKEN
name: garage-token-secret
name: garage-token
interval: 5m
path: /metrics
port: admin

View File

@@ -50,17 +50,17 @@ spec:
valueFrom:
secretKeyRef:
key: NTFY_TOKEN
name: gatus-config-secret
name: gatus-config
- name: "OIDC_CLIENT_ID"
valueFrom:
secretKeyRef:
key: OIDC_CLIENT_ID
name: gatus-oidc-secret
name: gatus-oidc-authentik
- name: "OIDC_CLIENT_SECRET"
valueFrom:
secretKeyRef:
key: OIDC_CLIENT_SECRET
name: gatus-oidc-secret
name: gatus-oidc-authentik
- name: "POSTGRES_DB"
valueFrom:
secretKeyRef:

View File

@@ -1,7 +1,7 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: gatus-config-secret
name: gatus-config
namespace: gatus
labels:
app.kubernetes.io/name: gatus-config-secret
@@ -10,9 +10,9 @@ metadata:
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: NTFY_TOKEN
remoteRef:
key: /ntfy/user/cl01tl
key: /cl01tl/ntfy/users/cl01tl
property: token

View File

@@ -1,22 +1,22 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: gatus-oidc-secret
name: gatus-oidc-authentik
namespace: gatus
labels:
app.kubernetes.io/name: gatus-oidc-secret
app.kubernetes.io/name: gatus-oidc-authentik
app.kubernetes.io/instance: gatus
app.kubernetes.io/part-of: gatus
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: OIDC_CLIENT_ID
remoteRef:
key: /authentik/oidc/gatus
key: /cl01tl/authentik/oidc/gatus
property: client
- secretKey: OIDC_CLIENT_SECRET
remoteRef:
key: /authentik/oidc/gatus
key: /cl01tl/authentik/oidc/gatus
property: secret

View File

@@ -111,7 +111,7 @@ spec:
valueFrom:
secretKeyRef:
key: ISSUE_INDEXER_CONN_STR
name: gitea-meilisearch-master-key-secret
name: gitea-meilisearch-key
volumeMounts:
- name: config
mountPath: /usr/sbinx
@@ -151,12 +151,12 @@ spec:
valueFrom:
secretKeyRef:
key: key
name: gitea-oidc-secret
name: gitea-oidc-authentik
- name: GITEA_OAUTH_SECRET_0
valueFrom:
secretKeyRef:
key: secret
name: gitea-oidc-secret
name: gitea-oidc-authentik
- name: GITEA_ADMIN_USERNAME
value: "gitea_admin"
- name: GITEA_ADMIN_PASSWORD

View File

@@ -1,22 +0,0 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: gitea-admin-secret
namespace: gitea
labels:
app.kubernetes.io/name: gitea-admin-secret
app.kubernetes.io/instance: gitea
app.kubernetes.io/part-of: gitea
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
data:
- secretKey: username
remoteRef:
key: /cl01tl/gitea/auth/admin
property: username
- secretKey: password
remoteRef:
key: /cl01tl/gitea/auth/admin
property: password

View File

@@ -1,16 +1,16 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: gitea-meilisearch-master-key-secret
name: gitea-meilisearch-key
namespace: gitea
labels:
app.kubernetes.io/name: gitea-meilisearch-master-key-secret
app.kubernetes.io/name: gitea-meilisearch-key
app.kubernetes.io/instance: gitea
app.kubernetes.io/part-of: gitea
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
target:
template:
mergePolicy: Merge
@@ -21,4 +21,4 @@ spec:
- secretKey: MEILI_MASTER_KEY
remoteRef:
key: /cl01tl/gitea/meilisearch
property: MEILI_MASTER_KEY
property: master-key

View File

@@ -1,22 +1,22 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: gitea-oidc-secret
name: gitea-oidc-authentik
namespace: gitea
labels:
app.kubernetes.io/name: gitea-oidc-secret
app.kubernetes.io/name: gitea-oidc-authentik
app.kubernetes.io/instance: gitea
app.kubernetes.io/part-of: gitea
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: secret
remoteRef:
key: /authentik/oidc/gitea
key: /cl01tl/authentik/oidc/gitea
property: secret
- secretKey: key
remoteRef:
key: /authentik/oidc/gitea
key: /cl01tl/authentik/oidc/gitea
property: client

View File

@@ -1,34 +0,0 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: gitea-renovate-secret
namespace: gitea
labels:
app.kubernetes.io/name: gitea-renovate-secret
app.kubernetes.io/instance: gitea
app.kubernetes.io/part-of: gitea
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
data:
- secretKey: RENOVATE_ENDPOINT
remoteRef:
key: /cl01tl/gitea/renovate
property: RENOVATE_ENDPOINT
- secretKey: RENOVATE_GIT_AUTHOR
remoteRef:
key: /cl01tl/gitea/renovate
property: RENOVATE_GIT_AUTHOR
- secretKey: RENOVATE_TOKEN
remoteRef:
key: /cl01tl/gitea/renovate
property: RENOVATE_TOKEN
- secretKey: RENOVATE_GIT_PRIVATE_KEY
remoteRef:
key: /cl01tl/gitea/renovate
property: id_rsa
- secretKey: RENOVATE_GITHUB_COM_TOKEN
remoteRef:
key: /github/gitea-cl01tl
property: token

View File

@@ -1,26 +0,0 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: gitea-renovate-ssh-secret
namespace: gitea
labels:
app.kubernetes.io/name: gitea-renovate-ssh-secret
app.kubernetes.io/instance: gitea
app.kubernetes.io/part-of: gitea
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
data:
- secretKey: config
remoteRef:
key: /cl01tl/gitea/renovate
property: ssh_config
- secretKey: id_rsa
remoteRef:
key: /cl01tl/gitea/renovate
property: id_rsa
- secretKey: id_rsa.pub
remoteRef:
key: /cl01tl/gitea/renovate
property: id_rsa.pub

View File

@@ -10,7 +10,7 @@ metadata:
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: token
remoteRef:

View File

@@ -21,8 +21,6 @@ spec:
type: PathPrefix
value: /
backendRefs:
- group: ''
kind: Service
- kind: Service
name: gitea-http
port: 3000
weight: 100

View File

@@ -21,7 +21,7 @@ spec:
http:
paths:
- path: /
pathType: ImplementationSpecific
pathType: Prefix
backend:
service:
name: gitea-http

View File

@@ -26,5 +26,5 @@ spec:
interval: 1m
scrapeTimeout: 10s
bearerTokenSecret:
name: gitea-meilisearch-master-key-secret
name: gitea-meilisearch-key
key: MEILI_MASTER_KEY

View File

@@ -62,7 +62,7 @@ spec:
- configMapRef:
name: gitea-meilisearch-environment
- secretRef:
name: gitea-meilisearch-master-key-secret
name: gitea-meilisearch-key
ports:
- name: http
containerPort: 7700

View File

@@ -16,8 +16,6 @@ spec:
sectionName: ssh
rules:
- backendRefs:
- group: ''
kind: Service
- kind: Service
name: gitea-ssh
port: 22
weight: 100

View File

@@ -1,22 +1,22 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: grafana-auth-secret
name: grafana-config
namespace: grafana-operator
labels:
app.kubernetes.io/name: grafana-auth-secret
app.kubernetes.io/name: grafana-config
app.kubernetes.io/instance: grafana-operator
app.kubernetes.io/part-of: grafana-operator
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: admin-user
remoteRef:
key: /cl01tl/grafana/auth
key: /cl01tl/grafana/config
property: admin-user
- secretKey: admin-password
remoteRef:
key: /cl01tl/grafana/auth
key: /cl01tl/grafana/config
property: admin-password

View File

@@ -1,22 +1,22 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: grafana-oauth-secret
name: grafana-oidc-authentik
namespace: grafana-operator
labels:
app.kubernetes.io/name: grafana-oauth-secret
app.kubernetes.io/name: grafana-oidc-authentik
app.kubernetes.io/instance: grafana-operator
app.kubernetes.io/part-of: grafana-operator
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: AUTH_CLIENT_ID
remoteRef:
key: /authentik/oidc/grafana
key: /cl01tl/authentik/oidc/grafana
property: client
- secretKey: AUTH_CLIENT_SECRET
remoteRef:
key: /authentik/oidc/grafana
key: /cl01tl/authentik/oidc/grafana
property: secret

View File

@@ -1,26 +0,0 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: grafana-operator-postgresql-18-cluster-backup-secret-garage
namespace: grafana-operator
labels:
app.kubernetes.io/name: grafana-operator-postgresql-18-cluster-backup-secret-garage
app.kubernetes.io/instance: grafana-operator
app.kubernetes.io/part-of: grafana-operator
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
data:
- secretKey: ACCESS_KEY_ID
remoteRef:
key: /garage/home-infra/postgres-backups
property: ACCESS_KEY_ID
- secretKey: ACCESS_SECRET_KEY
remoteRef:
key: /garage/home-infra/postgres-backups
property: ACCESS_SECRET_KEY
- secretKey: ACCESS_REGION
remoteRef:
key: /garage/home-infra/postgres-backups
property: ACCESS_REGION

View File

@@ -1,22 +0,0 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: grafana-operator-postgresql-18-cluster-backup-secret
namespace: grafana-operator
labels:
app.kubernetes.io/name: grafana-operator-postgresql-18-cluster-backup-secret
app.kubernetes.io/instance: grafana-operator
app.kubernetes.io/part-of: grafana-operator
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
data:
- secretKey: ACCESS_KEY_ID
remoteRef:
key: /digital-ocean/home-infra/postgres-backups
property: access
- secretKey: ACCESS_SECRET_KEY
remoteRef:
key: /digital-ocean/home-infra/postgres-backups
property: secret

View File

@@ -65,22 +65,22 @@ spec:
- name: AUTH_CLIENT_ID
valueFrom:
secretKeyRef:
name: grafana-oauth-secret
name: grafana-oidc-authentik
key: AUTH_CLIENT_ID
- name: AUTH_CLIENT_SECRET
valueFrom:
secretKeyRef:
name: grafana-oauth-secret
name: grafana-oidc-authentik
key: AUTH_CLIENT_SECRET
- name: ADMIN_USER
valueFrom:
secretKeyRef:
name: grafana-auth-secret
name: grafana-config
key: admin-user
- name: ADMIN_PASSWORD
valueFrom:
secretKeyRef:
name: grafana-auth-secret
name: grafana-config
key: admin-password
- name: DB_HOST
valueFrom:

View File

@@ -52,7 +52,7 @@ spec:
valueFrom:
secretKeyRef:
key: password
name: grimmory-database-secret
name: grimmory-database-config
- name: GRIMMORY_PORT
value: "6060"
- name: SWAGGER_ENABLED

View File

@@ -1,18 +0,0 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: grimmory-data-replication-secret
namespace: grimmory
labels:
app.kubernetes.io/name: grimmory-data-replication-secret
app.kubernetes.io/instance: grimmory
app.kubernetes.io/part-of: grimmory
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
data:
- secretKey: psk.txt
remoteRef:
key: /cl01tl/grimmory/replication
property: psk.txt

View File

@@ -1,16 +1,16 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: grimmory-database-secret
name: grimmory-database-config
namespace: grimmory
labels:
app.kubernetes.io/name: grimmory-database-secret
app.kubernetes.io/name: grimmory-database-config
app.kubernetes.io/instance: grimmory
app.kubernetes.io/part-of: grimmory
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: password
remoteRef:

View File

@@ -10,7 +10,7 @@ metadata:
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: access
remoteRef:

View File

@@ -10,13 +10,13 @@ metadata:
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: access
remoteRef:
key: /garage/home-infra/mariadb-backups
property: access
property: ACCESS_KEY_ID
- secretKey: secret
remoteRef:
key: /garage/home-infra/mariadb-backups
property: secret
property: ACCESS_SECRET_KEY

View File

@@ -31,6 +31,6 @@ spec:
rootPasswordSecretKeyRef:
generate: false
key: password
name: grimmory-database-secret
name: grimmory-database-config
storage:
size: 5Gi

View File

@@ -2,12 +2,7 @@ apiVersion: v1
kind: Namespace
metadata:
name: grimmory
annotations:
volsync.backube/privileged-movers: "true"
labels:
app.kubernetes.io/name: grimmory
app.kubernetes.io/instance: grimmory
app.kubernetes.io/part-of: grimmory
pod-security.kubernetes.io/audit: privileged
pod-security.kubernetes.io/enforce: privileged
pod-security.kubernetes.io/warn: privileged

View File

@@ -15,7 +15,7 @@ spec:
accessModes:
- ReadWriteMany
nfs:
path: /volume2/Storage/Books Import
path: '/volume2/Storage/Books Import'
server: synologybond.alexlebens.net
mountOptions:
- vers=4

View File

@@ -10,7 +10,7 @@ metadata:
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: HARBOR_ADMIN_PASSWORD
remoteRef:
@@ -18,12 +18,12 @@ spec:
property: admin-password
- secretKey: secretKey
remoteRef:
key: /cl01tl/harbor/config
property: secretKey
key: /cl01tl/harbor/key
property: secret-key
- secretKey: CSRF_KEY
remoteRef:
key: /cl01tl/harbor/core
property: CSRF_KEY
key: /cl01tl/harbor/key
property: csrf-key
- secretKey: secret
remoteRef:
key: /cl01tl/harbor/core
@@ -39,24 +39,20 @@ spec:
- secretKey: JOBSERVICE_SECRET
remoteRef:
key: /cl01tl/harbor/jobservice
property: JOBSERVICE_SECRET
property: secret
- secretKey: REGISTRY_HTTP_SECRET
remoteRef:
key: /cl01tl/harbor/registry
property: REGISTRY_HTTP_SECRET
- secretKey: REGISTRY_REDIS_PASSWORD
remoteRef:
key: /cl01tl/harbor/registry
property: REGISTRY_REDIS_PASSWORD
property: http-secret
- secretKey: REGISTRY_HTPASSWD
remoteRef:
key: /cl01tl/harbor/registry
property: REGISTRY_HTPASSWD
property: ht-passwd
- secretKey: REGISTRY_CREDENTIAL_PASSWORD
remoteRef:
key: /cl01tl/harbor/registry
property: REGISTRY_CREDENTIAL_PASSWORD
property: credential-password
- secretKey: REGISTRY_PASSWD
remoteRef:
key: /cl01tl/harbor/registry
property: REGISTRY_CREDENTIAL_PASSWORD
property: credential-password

View File

@@ -8,13 +8,13 @@ metadata:
app.kubernetes.io/instance: headlamp
app.kubernetes.io/part-of: headlamp
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: cluster-admin
apiGroup: rbac.authorization.k8s.io
subjects:
- kind: User
- apiGroup: rbac.authorization.k8s.io
kind: User
name: https://authentik.alexlebens.net/application/o/headlamp/#alexanderlebens@gmail.com
apiGroup: rbac.authorization.k8s.io
- kind: ServiceAccount
name: headlamp-admin
namespace: headlamp

View File

@@ -36,7 +36,7 @@ spec:
imagePullPolicy: IfNotPresent
envFrom:
- secretRef:
name: headlamp-oidc-secret
name: headlamp-oidc-authentik
args:
- "-in-cluster"
- "-in-cluster-context-name=main"

View File

@@ -1,38 +1,38 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: headlamp-oidc-secret
name: headlamp-oidc-authentik
namespace: headlamp
labels:
app.kubernetes.io/name: headlamp-oidc-secret
app.kubernetes.io/name: headlamp-oidc-authentik
app.kubernetes.io/instance: headlamp
app.kubernetes.io/part-of: headlamp
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: OIDC_CLIENT_ID
remoteRef:
key: /authentik/oidc/headlamp
key: /cl01tl/authentik/oidc/headlamp
property: client
- secretKey: OIDC_CLIENT_SECRET
remoteRef:
key: /authentik/oidc/headlamp
key: /cl01tl/authentik/oidc/headlamp
property: secret
- secretKey: OIDC_ISSUER_URL
remoteRef:
key: /authentik/oidc/headlamp
key: /cl01tl/authentik/oidc/headlamp
property: issuer
- secretKey: OIDC_SCOPES
remoteRef:
key: /authentik/oidc/headlamp
key: /cl01tl/authentik/oidc/headlamp
property: scopes
- secretKey: HEADLAMP_CONFIG_OIDC_VALIDATOR_IDP_ISSUER_URL
remoteRef:
key: /authentik/oidc/headlamp
property: validator-issuer-url
key: /cl01tl/authentik/oidc/headlamp
property: issuer
- secretKey: HEADLAMP_CONFIG_OIDC_VALIDATOR_CLIENT_ID
remoteRef:
key: /authentik/oidc/headlamp
property: validator-client-id
key: /cl01tl/authentik/oidc/headlamp
property: client

View File

@@ -19,11 +19,9 @@ spec:
- headlamp.alexlebens.net
rules:
- backendRefs:
- group: ""
kind: Service
- kind: Service
name: headlamp
port: 80
weight: 100
matches:
- path:
type: PathPrefix

View File

@@ -48,7 +48,7 @@ spec:
value: /config
envFrom:
- secretRef:
name: home-assistant-code-server-password-secret
name: home-assistant-code-server-password
image: ghcr.io/linuxserver/code-server:4.116.0-ls333@sha256:4620adace18935dd6ca79d77e3bc1c379e21875392192f970cf5d6b0fb4aefcd
name: code-server
volumeMounts:

View File

@@ -1,22 +1,22 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: home-assistant-code-server-password-secret
name: home-assistant-code-server-password
namespace: home-assistant
labels:
app.kubernetes.io/name: home-assistant-code-server-password-secret
app.kubernetes.io/name: home-assistant-code-server-password
app.kubernetes.io/instance: home-assistant
app.kubernetes.io/part-of: home-assistant
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: PASSWORD
remoteRef:
key: /cl01tl/home-assistant/code-server/auth
property: PASSWORD
key: /cl01tl/home-assistant/code-server
property: password
- secretKey: SUDO_PASSWORD
remoteRef:
key: /cl01tl/home-assistant/code-server/auth
property: SUDO_PASSWORD
key: /cl01tl/home-assistant/code-server
property: sudo-password

View File

@@ -1,18 +1,18 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: home-assistant-token-secret
name: home-assistant-metric-token
namespace: home-assistant
labels:
app.kubernetes.io/name: home-assistant-token-secret
app.kubernetes.io/name: home-assistant-metric-token
app.kubernetes.io/instance: home-assistant
app.kubernetes.io/part-of: home-assistant
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: bearer-token
remoteRef:
key: /cl01tl/home-assistant/auth
key: /cl01tl/home-assistant/config
property: bearer-token

View File

@@ -21,7 +21,7 @@ spec:
endpoints:
- bearerTokenSecret:
key: bearer-token
name: home-assistant-token-secret
name: home-assistant-metric-token
interval: 3m
path: /api/prometheus
port: http

View File

@@ -44,7 +44,7 @@ spec:
value: home.alexlebens.net
envFrom:
- secretRef:
name: homepage-keys-secret
name: homepage-secrets
image: ghcr.io/gethomepage/homepage:v1.12.3@sha256:cc84f2f5eb3c7734353701ccbaa24ed02dacb0d119114e50e4251e2005f3990a
name: main
resources:

View File

@@ -1,20 +1,20 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: homepage-keys-secret
name: homepage-secrets
namespace: homepage
labels:
app.kubernetes.io/name: homepage-keys-secret
app.kubernetes.io/name: homepage-secrets
app.kubernetes.io/instance: homepage
app.kubernetes.io/part-of: homepage
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: HOMEPAGE_VAR_GITEA_API_TOKEN
remoteRef:
key: /cl01tl/gitea/auth/homepage
key: /cl01tl/gitea/users/bot
property: token
- secretKey: HOMEPAGE_VAR_ARGOCD_API_TOKEN
remoteRef:
@@ -34,47 +34,47 @@ spec:
property: key
- secretKey: HOMEPAGE_VAR_SYNOLOGY_USER
remoteRef:
key: /synology/auth/cl01tl
key: /synology/users/remote_stats
property: user
- secretKey: HOMEPAGE_VAR_SYNOLOGY_PASSWORD
remoteRef:
key: /synology/auth/cl01tl
key: /synology/users/remote_stats
property: password
- secretKey: HOMEPAGE_VAR_UNIFI_API_KEY
remoteRef:
key: /unifi/auth/cl01tl
key: /unifi/users/cl01tl
property: api-key
- secretKey: HOMEPAGE_VAR_SONARR_KEY
remoteRef:
key: /cl01tl/sonarr4/key
key: /cl01tl/sonarr/key
property: key
- secretKey: HOMEPAGE_VAR_SONARR4K_KEY
remoteRef:
key: /cl01tl/sonarr4-4k/key
key: /cl01tl/sonarr-4k/key
property: key
- secretKey: HOMEPAGE_VAR_SONARRANIME_KEY
remoteRef:
key: /cl01tl/sonarr4-anime/key
key: /cl01tl/sonarr-anime/key
property: key
- secretKey: HOMEPAGE_VAR_RADARR_KEY
remoteRef:
key: /cl01tl/radarr5/key
key: /cl01tl/radarr/key
property: key
- secretKey: HOMEPAGE_VAR_RADARR4K_KEY
remoteRef:
key: /cl01tl/radarr5-4k/key
key: /cl01tl/radarr-4k/key
property: key
- secretKey: HOMEPAGE_VAR_RADARRANIME_KEY
remoteRef:
key: /cl01tl/radarr5-anime/key
key: /cl01tl/radarr-anime/key
property: key
- secretKey: HOMEPAGE_VAR_RADARRSTANDUP_KEY
remoteRef:
key: /cl01tl/radarr5-standup/key
key: /cl01tl/radarr-standup/key
property: key
- secretKey: HOMEPAGE_VAR_LIDARR_KEY
remoteRef:
key: /cl01tl/lidarr2/key
key: /cl01tl/lidarr/key
property: key
- secretKey: HOMEPAGE_VAR_PROWLARR_KEY
remoteRef:

View File

@@ -21,13 +21,15 @@ spec:
app.kubernetes.io/instance: immich
template:
metadata:
annotations:
checksum/secrets: 46a3f57ca394cccffc419e0c17f5d5f366374b0651c02c507636c53c0b5f33e6
labels:
app.kubernetes.io/controller: main
app.kubernetes.io/instance: immich
app.kubernetes.io/name: immich
spec:
enableServiceLinks: false
serviceAccountName: default
serviceAccountName: immich
automountServiceAccountToken: true
hostIPC: false
hostNetwork: false
@@ -112,9 +114,12 @@ spec:
- mountPath: /usr/src/app/upload
name: data
volumes:
- name: config
secret:
secretName: immich-config-secret
- csi:
driver: secrets-store.csi.k8s.io
readOnly: true
volumeAttributes:
secretProviderClass: immich-config
name: config
- name: data
persistentVolumeClaim:
claimName: immich

View File

@@ -1,18 +0,0 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: immich-config-secret
namespace: immich
labels:
app.kubernetes.io/name: immich-config-secret
app.kubernetes.io/instance: immich
app.kubernetes.io/part-of: immich
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
data:
- secretKey: immich.json
remoteRef:
key: /cl01tl/immich/config
property: immich.json

View File

@@ -0,0 +1,13 @@
apiVersion: v1
kind: Secret
type: kubernetes.io/service-account-token
metadata:
name: immich-immich-sa-token
labels:
app.kubernetes.io/instance: immich
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: immich
helm.sh/chart: immich-4.6.2
annotations:
kubernetes.io/service-account.name: immich
namespace: immich

View File

@@ -0,0 +1,19 @@
apiVersion: secrets-store.csi.x-k8s.io/v1
kind: SecretProviderClass
metadata:
name: immich-config
namespace: immich
labels:
app.kubernetes.io/name: immich-config
app.kubernetes.io/instance: immich
app.kubernetes.io/part-of: immich
spec:
provider: openbao
parameters:
baoAddress: "http://openbao-internal.openbao:8200"
roleName: immich
objects: |
- objectName: immich.json
fileName: immich.json
secretPath: secret/data/cl01tl/immich/config
secretKey: immich.json

View File

@@ -0,0 +1,12 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: immich
labels:
app.kubernetes.io/instance: immich
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: immich
helm.sh/chart: immich-4.6.2
namespace: immich
secrets:
- name: immich-immich-sa-token

View File

@@ -55,7 +55,7 @@ spec:
valueFrom:
secretKeyRef:
key: token
name: jellyfin-exporter-secret
name: jellyfin-metric-token
image: rebelcore/jellyfin-exporter:v1.5.0@sha256:37e6d389654180ad9e1661210a48fee71a6dc355a160670235a00329da0dbf80
name: exporter
- env:

View File

@@ -1,18 +1,18 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: jellyfin-meilisearch-master-key-secret
name: jellyfin-meilisearch-key
namespace: jellyfin
labels:
app.kubernetes.io/name: jellyfin-meilisearch-master-key-secret
app.kubernetes.io/name: jellyfin-meilisearch-key
app.kubernetes.io/instance: jellyfin
app.kubernetes.io/part-of: jellyfin
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: MEILI_MASTER_KEY
remoteRef:
key: /cl01tl/jellyfin/meilisearch
property: MEILI_MASTER_KEY
property: master-key

View File

@@ -1,18 +1,18 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: jellyfin-exporter-secret
name: jellyfin-metric-token
namespace: jellyfin
labels:
app.kubernetes.io/name: jellyfin-exporter-secret
app.kubernetes.io/name: jellyfin-metric-token
app.kubernetes.io/instance: jellyfin
app.kubernetes.io/part-of: jellyfin
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: token
remoteRef:
key: /cl01tl/jellyfin/exporter
key: /cl01tl/jellyfin/metrics
property: token

View File

@@ -26,5 +26,5 @@ spec:
interval: 1m
scrapeTimeout: 10s
bearerTokenSecret:
name: jellyfin-meilisearch-master-key-secret
name: jellyfin-meilisearch-key
key: MEILI_MASTER_KEY

View File

@@ -62,7 +62,7 @@ spec:
- configMapRef:
name: jellyfin-meilisearch-environment
- secretRef:
name: jellyfin-meilisearch-master-key-secret
name: jellyfin-meilisearch-key
ports:
- name: http
containerPort: 7700

View File

@@ -41,17 +41,17 @@ spec:
valueFrom:
secretKeyRef:
key: secret-key
name: jellystat-secret
name: jellystat-config
- name: JS_USER
valueFrom:
secretKeyRef:
key: user
name: jellystat-secret
name: jellystat-config
- name: JS_PASSWORD
valueFrom:
secretKeyRef:
key: password
name: jellystat-secret
name: jellystat-config
- name: POSTGRES_USER
valueFrom:
secretKeyRef:

View File

@@ -1,26 +1,26 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: jellystat-secret
name: jellystat-config
namespace: jellystat
labels:
app.kubernetes.io/name: jellystat-secret
app.kubernetes.io/name: jellystat-config
app.kubernetes.io/instance: jellystat
app.kubernetes.io/part-of: jellystat
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: secret-key
remoteRef:
key: /cl01tl/jellystat/auth
key: /cl01tl/jellystat/key
property: secret-key
- secretKey: user
remoteRef:
key: /cl01tl/jellystat/auth
key: /cl01tl/jellystat/config
property: user
- secretKey: password
remoteRef:
key: /cl01tl/jellystat/auth
key: /cl01tl/jellystat/cconfig
property: password

View File

@@ -54,21 +54,27 @@ spec:
valueFrom:
secretKeyRef:
key: key
name: karakeep-key-secret
name: karakeep-key
- name: PROMETHEUS_AUTH_TOKEN
valueFrom:
secretKeyRef:
key: prometheus-token
name: karakeep-key-secret
name: karakeep-metric-token
- name: ASSET_STORE_S3_ENDPOINT
value: http://garage-main.garage:3900
valueFrom:
secretKeyRef:
key: ENDPOINT
name: karakeep-bucket-garage
- name: ASSET_STORE_S3_REGION
valueFrom:
secretKeyRef:
key: ACCESS_REGION
name: karakeep-bucket-garage
- name: ASSET_STORE_S3_BUCKET
value: karakeep-assets
valueFrom:
secretKeyRef:
key: BUCKET
name: karakeep-bucket-garage
- name: ASSET_STORE_S3_ACCESS_KEY_ID
valueFrom:
secretKeyRef:
@@ -87,7 +93,7 @@ spec:
valueFrom:
secretKeyRef:
key: MEILI_MASTER_KEY
name: karakeep-meilisearch-master-key-secret
name: karakeep-meilisearch-key
- name: BROWSER_WEB_URL
value: http://karakeep.karakeep:9222
- name: DISABLE_SIGNUPS
@@ -102,12 +108,12 @@ spec:
valueFrom:
secretKeyRef:
key: AUTHENTIK_CLIENT_ID
name: karakeep-oidc-secret
name: karakeep-oidc-authentik
- name: OAUTH_CLIENT_SECRET
valueFrom:
secretKeyRef:
key: AUTHENTIK_CLIENT_SECRET
name: karakeep-oidc-secret
name: karakeep-oidc-authentik
- name: OLLAMA_BASE_URL
value: http://ollama-server-3.ollama:11434
- name: OLLAMA_KEEP_ALIVE

View File

@@ -10,7 +10,7 @@ metadata:
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: ACCESS_KEY_ID
remoteRef:
@@ -24,3 +24,11 @@ spec:
remoteRef:
key: /garage/home-infra/karakeep-assets
property: ACCESS_REGION
- secretKey: BUCKET
remoteRef:
key: /garage/home-infra/karakeep-assets
property: BUCKET
- secretKey: ENDPOINT
remoteRef:
key: /garage/config
property: ENDPOINT_LOCAL

View File

@@ -0,0 +1,18 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: karakeep-key
namespace: karakeep
labels:
app.kubernetes.io/name: karakeep-key
app.kubernetes.io/instance: karakeep
app.kubernetes.io/part-of: karakeep
spec:
secretStoreRef:
kind: ClusterSecretStore
name: openbao
data:
- secretKey: key
remoteRef:
key: /cl01tl/karakeep/key
property: key

View File

@@ -1,18 +1,18 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: karakeep-meilisearch-master-key-secret
name: karakeep-meilisearch-key
namespace: karakeep
labels:
app.kubernetes.io/name: karakeep-meilisearch-master-key-secret
app.kubernetes.io/name: karakeep-meilisearch-key
app.kubernetes.io/instance: karakeep
app.kubernetes.io/part-of: karakeep
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: MEILI_MASTER_KEY
remoteRef:
key: /cl01tl/karakeep/meilisearch
property: MEILI_MASTER_KEY
property: master-key

View File

@@ -1,7 +1,7 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: karakeep-key-secret
name: karakeep-metric-token
namespace: karakeep
labels:
app.kubernetes.io/name: karakeep-key-secret
@@ -10,13 +10,9 @@ metadata:
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: key
remoteRef:
key: /cl01tl/karakeep/key
property: key
- secretKey: prometheus-token
remoteRef:
key: /cl01tl/karakeep/key
property: prometheus-token
key: /cl01tl/karakeep/metrics
property: token

View File

@@ -1,22 +1,22 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: karakeep-oidc-secret
name: karakeep-oidc-authentik
namespace: karakeep
labels:
app.kubernetes.io/name: karakeep-oidc-secret
app.kubernetes.io/name: karakeep-oidc-authentik
app.kubernetes.io/instance: karakeep
app.kubernetes.io/part-of: karakeep
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: AUTHENTIK_CLIENT_ID
remoteRef:
key: /authentik/oidc/karakeep
key: /cl01tl/authentik/oidc/karakeep
property: client
- secretKey: AUTHENTIK_CLIENT_SECRET
remoteRef:
key: /authentik/oidc/karakeep
key: /cl01tl/authentik/oidc/karakeep
property: secret

View File

@@ -26,5 +26,5 @@ spec:
interval: 1m
scrapeTimeout: 10s
bearerTokenSecret:
name: karakeep-meilisearch-master-key-secret
name: karakeep-meilisearch-key
key: MEILI_MASTER_KEY

View File

@@ -21,7 +21,7 @@ spec:
- authorization:
credentials:
key: prometheus-token
name: karakeep-key-secret
name: karakeep-metric-token
interval: 30s
path: /api/metrics
port: http

View File

@@ -62,7 +62,7 @@ spec:
- configMapRef:
name: karakeep-meilisearch-environment
- secretRef:
name: karakeep-meilisearch-master-key-secret
name: karakeep-meilisearch-key
ports:
- name: http
containerPort: 7700

View File

@@ -93,13 +93,13 @@ spec:
- name: KOMODO_OIDC_CLIENT_ID
valueFrom:
secretKeyRef:
key: oidc-client-id
name: komodo-secret
key: client
name: komodo-oidc-authentik
- name: KOMODO_OIDC_CLIENT_SECRET
valueFrom:
secretKeyRef:
key: oidc-client-secret
name: komodo-secret
key: secret
name: komodo-oidc-authentik
- name: KOMODO_OIDC_USE_FULL_EMAIL
value: "true"
image: ghcr.io/moghtech/komodo-core:2.1.2@sha256:8a7dbba232e4e49797bb412be5f78207c89fcf22cc2727b38631ae30f7518a4c

View File

@@ -0,0 +1,22 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: komodo-oidc-authentik
namespace: komodo
labels:
app.kubernetes.io/name: komodo-oidc-authentik
app.kubernetes.io/instance: komodo
app.kubernetes.io/part-of: komodo
spec:
secretStoreRef:
kind: ClusterSecretStore
name: openbao
data:
- secretKey: client
remoteRef:
key: /cl01tl/authentik/oidc/komodo
property: client
- secretKey: secret
remoteRef:
key: /cl01tl/authentik/oidc/komodo
property: secret

View File

@@ -10,7 +10,7 @@ metadata:
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: uri
remoteRef:

View File

@@ -10,25 +10,17 @@ metadata:
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: passkey
remoteRef:
key: /cl01tl/komodo/config
key: /cl01tl/komodo/key
property: passkey
- secretKey: jwt
remoteRef:
key: /cl01tl/komodo/config
key: /cl01tl/komodo/key
property: jwt
- secretKey: webhook
remoteRef:
key: /cl01tl/komodo/config
key: /cl01tl/komodo/key
property: webhook
- secretKey: oidc-client-id
remoteRef:
key: /authentik/oidc/komodo
property: client
- secretKey: oidc-client-secret
remoteRef:
key: /authentik/oidc/komodo
property: secret

View File

@@ -26,7 +26,7 @@ spec:
logLevel: "info"
retention: "120h"
secrets:
- alertmanager-config-secret
- alertmanager-ntfy-config
alertmanagerConfigSelector: {}
alertmanagerConfigNamespaceSelector: {}
routePrefix: "/"

View File

@@ -21,13 +21,15 @@ spec:
app.kubernetes.io/instance: kube-prometheus-stack
template:
metadata:
annotations:
checksum/secrets: 3c0d4bd47e7d4f71ba55611ddc7b74c5f3ec1cedcc474b15ac0a00daab9b791a
labels:
app.kubernetes.io/controller: main
app.kubernetes.io/instance: kube-prometheus-stack
app.kubernetes.io/name: kube-prometheus-stack
spec:
enableServiceLinks: false
serviceAccountName: default
serviceAccountName: ntfy-alertmanager
automountServiceAccountToken: true
hostIPC: false
hostNetwork: false
@@ -43,6 +45,9 @@ spec:
readOnly: true
subPath: config
volumes:
- name: config
secret:
secretName: ntfy-alertmanager-config-secret
- csi:
driver: secrets-store.csi.k8s.io
readOnly: true
volumeAttributes:
secretProviderClass: ntfy-alertmanager-config
name: config

View File

@@ -1,18 +1,18 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: alertmanager-config-secret
name: alertmanager-ntfy-config
namespace: kube-prometheus-stack
labels:
app.kubernetes.io/name: alertmanager-config-secret
app.kubernetes.io/name: alertmanager-ntfy-config
app.kubernetes.io/instance: kube-prometheus-stack
app.kubernetes.io/part-of: kube-prometheus-stack
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: ntfy_password
remoteRef:
key: /cl01tl/kube-prometheus-stack/ntfy-alertmanager
property: ntfy_password
key: / cl01tl/ntfy/users/cl01tl
property: password

View File

@@ -1,18 +1,18 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: garage-metric-secret
name: garage-metric-token
namespace: kube-prometheus-stack
labels:
app.kubernetes.io/name: garage-metric-secret
app.kubernetes.io/name: garage-metric-token
app.kubernetes.io/instance: kube-prometheus-stack
app.kubernetes.io/part-of: kube-prometheus-stack
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: token
remoteRef:
key: /garage/token
property: metric
key: /ps10rp/garage/config
property: metrics-token

View File

@@ -1,22 +0,0 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: ntfy-alertmanager-config-secret
namespace: kube-prometheus-stack
labels:
app.kubernetes.io/name: ntfy-alertmanager-config-secret
app.kubernetes.io/instance: kube-prometheus-stack
app.kubernetes.io/part-of: kube-prometheus-stack
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
data:
- secretKey: ntfy_password
remoteRef:
key: /cl01tl/kube-prometheus-stack/ntfy-alertmanager
property: ntfy_password
- secretKey: config
remoteRef:
key: /cl01tl/kube-prometheus-stack/ntfy-alertmanager
property: config

View File

@@ -20,4 +20,4 @@ spec:
type: Bearer
credentials:
key: token
name: garage-metric-secret
name: garage-metric-token

View File

@@ -0,0 +1,13 @@
apiVersion: v1
kind: Secret
type: kubernetes.io/service-account-token
metadata:
name: ntfy-alertmanager-ntfy-alertmanager-sa-token
labels:
app.kubernetes.io/instance: kube-prometheus-stack
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kube-prometheus-stack
helm.sh/chart: ntfy-alertmanager-4.6.2
annotations:
kubernetes.io/service-account.name: ntfy-alertmanager
namespace: kube-prometheus-stack

View File

@@ -0,0 +1,19 @@
apiVersion: secrets-store.csi.x-k8s.io/v1
kind: SecretProviderClass
metadata:
name: ntfy-alertmanager-config
namespace: kube-prometheus-stack
labels:
app.kubernetes.io/name: ntfy-alertmanager-config
app.kubernetes.io/instance: kube-prometheus-stack
app.kubernetes.io/part-of: kube-prometheus-stack
spec:
provider: openbao
parameters:
baoAddress: "http://openbao-internal.openbao:8200"
roleName: ntfy-alertmanager
objects: |
- objectName: config
fileName: config
secretPath: secret/data/cl01tl/kube-prometheus-stack/ntfy-alertmanager
secretKey: config

View File

@@ -0,0 +1,12 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: ntfy-alertmanager
labels:
app.kubernetes.io/instance: kube-prometheus-stack
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: kube-prometheus-stack
helm.sh/chart: ntfy-alertmanager-4.6.2
namespace: kube-prometheus-stack
secrets:
- name: ntfy-alertmanager-ntfy-alertmanager-sa-token

View File

@@ -6,6 +6,6 @@ metadata:
app.kubernetes.io/name: kubelet-serving-cert-approver
app.kubernetes.io/instance: kubelet-serving-cert-approver
app.kubernetes.io/part-of: kubelet-serving-cert-approver
pod-security.kubernetes.io/audit: restricted
pod-security.kubernetes.io/enforce: restricted
pod-security.kubernetes.io/warn: restricted
pod-security.kubernetes.io/audit: privileged
pod-security.kubernetes.io/enforce: privileged
pod-security.kubernetes.io/warn: privileged

View File

@@ -10,7 +10,7 @@ metadata:
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
name: openbao
data:
- secretKey: AUTH_KEY
remoteRef:

Some files were not shown because too many files have changed in this diff Show More