Compare commits
31 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
d9ebaaab6e
|
|||
| 878d558f86 | |||
|
da630155c2
|
|||
| 4634fcd2f5 | |||
| 8abba26a96 | |||
| b302a3addf | |||
| cb639b8ee3 | |||
| 621418c12d | |||
| 89226572df | |||
| 66d87ed8a6 | |||
| a6d0ab3ff5 | |||
| 021f2a72cd | |||
| f79044596b | |||
| 0d7eca2ab4 | |||
|
28cc1c01f1
|
|||
| f1397dafc4 | |||
|
f89d3acad2
|
|||
| 25c4861900 | |||
| 728de23978 | |||
|
f0a65adff4
|
|||
| 45f0c27905 | |||
| 629f442476 | |||
| 969f3b157b | |||
|
cdf66427f0
|
|||
| 3524ec839b | |||
| c9e20debfa | |||
| 28744c2a13 | |||
|
7bf8dacafa
|
|||
| 06f2ef0690 | |||
| 318e34c2e2 | |||
| 654ac8f68d |
@@ -13,7 +13,7 @@ on:
|
|||||||
jobs:
|
jobs:
|
||||||
renovate:
|
renovate:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
container: ghcr.io/renovatebot/renovate:43.194.0@sha256:8b0529e2502c61e5af507ed4a12fd042b68ae5441c9861694238206f06516228
|
container: ghcr.io/renovatebot/renovate:43.195.0@sha256:47421f2f3f82048e969b5195dd808d5ac2c5f69d43d192191c4a3dca390afe06
|
||||||
steps:
|
steps:
|
||||||
- name: Checkout
|
- name: Checkout
|
||||||
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6
|
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: authentik
|
- name: authentik
|
||||||
repository: https://charts.goauthentik.io/
|
repository: https://charts.goauthentik.io/
|
||||||
version: 2026.2.3
|
version: 2026.5.0
|
||||||
- name: cloudflared
|
- name: cloudflared
|
||||||
repository: oci://harbor.alexlebens.net/helm-charts
|
repository: oci://harbor.alexlebens.net/helm-charts
|
||||||
version: 3.3.1
|
version: 3.3.1
|
||||||
@@ -11,5 +11,5 @@ dependencies:
|
|||||||
- name: valkey
|
- name: valkey
|
||||||
repository: oci://harbor.alexlebens.net/helm-charts
|
repository: oci://harbor.alexlebens.net/helm-charts
|
||||||
version: 0.9.0
|
version: 0.9.0
|
||||||
digest: sha256:4aa66600bce643181cbf413fcba8d26563db238833f27392da16919df75246a3
|
digest: sha256:8688b819ca57468c53821b0bda7e1ae21cf7fd3570724c2bf2bce52e88c20171
|
||||||
generated: "2026-05-21T20:05:03.197812688Z"
|
generated: "2026-05-22T19:44:38.634358324Z"
|
||||||
|
|||||||
@@ -18,7 +18,7 @@ maintainers:
|
|||||||
- name: alexlebens
|
- name: alexlebens
|
||||||
dependencies:
|
dependencies:
|
||||||
- name: authentik
|
- name: authentik
|
||||||
version: 2026.2.3
|
version: 2026.5.0
|
||||||
repository: https://charts.goauthentik.io/
|
repository: https://charts.goauthentik.io/
|
||||||
- name: cloudflared
|
- name: cloudflared
|
||||||
repository: oci://harbor.alexlebens.net/helm-charts
|
repository: oci://harbor.alexlebens.net/helm-charts
|
||||||
|
|||||||
@@ -164,7 +164,6 @@ blocky:
|
|||||||
sparkyfitness IN CNAME traefik-cl01tl
|
sparkyfitness IN CNAME traefik-cl01tl
|
||||||
tdarr IN CNAME traefik-cl01tl
|
tdarr IN CNAME traefik-cl01tl
|
||||||
tubearchivist IN CNAME traefik-cl01tl
|
tubearchivist IN CNAME traefik-cl01tl
|
||||||
vault IN CNAME traefik-cl01tl
|
|
||||||
whodb IN CNAME traefik-cl01tl
|
whodb IN CNAME traefik-cl01tl
|
||||||
yamtrack IN CNAME traefik-cl01tl
|
yamtrack IN CNAME traefik-cl01tl
|
||||||
yubal IN CNAME traefik-cl01tl
|
yubal IN CNAME traefik-cl01tl
|
||||||
|
|||||||
@@ -258,9 +258,6 @@ gatus:
|
|||||||
- name: whodb
|
- name: whodb
|
||||||
url: https://whodb.alexlebens.net
|
url: https://whodb.alexlebens.net
|
||||||
<<: *defaults
|
<<: *defaults
|
||||||
- name: vault
|
|
||||||
url: https://vault.alexlebens.net
|
|
||||||
<<: *defaults
|
|
||||||
- name: openbao
|
- name: openbao
|
||||||
url: https://bao.alexlebens.net
|
url: https://bao.alexlebens.net
|
||||||
<<: *defaults
|
<<: *defaults
|
||||||
|
|||||||
@@ -193,8 +193,8 @@ gitea-actions:
|
|||||||
runner:
|
runner:
|
||||||
registry: docker.io
|
registry: docker.io
|
||||||
repository: gitea/runner
|
repository: gitea/runner
|
||||||
# renovate: datasource=docker depName=gitea/act_runner
|
# renovate: datasource=docker depName=gitea/runner
|
||||||
tag: 1.0.5@sha256:1fe8fd56be1fe2a88dfe9c58ba602bc1ad758846dcecdc3ebdc28db63be09e73
|
tag: 1.0.6@sha256:ab581a3e1a260efa0521886ad8051f0e8c4ff1f1d52aa8ef0a2e3ad7465f8b74
|
||||||
extraVolumeMounts:
|
extraVolumeMounts:
|
||||||
- name: workspace-vol
|
- name: workspace-vol
|
||||||
mountPath: /workspace
|
mountPath: /workspace
|
||||||
@@ -212,7 +212,7 @@ gitea-actions:
|
|||||||
registry: docker.io
|
registry: docker.io
|
||||||
repository: docker
|
repository: docker
|
||||||
# renovate: datasource=docker depName=docker
|
# renovate: datasource=docker depName=docker
|
||||||
tag: 29.5.2-dind@sha256:eb37f58646a901dc7727cf448cae36daaefaba79de33b5058dab79aa4c04aefb
|
tag: 29.5.2-dind@sha256:6b9cd914eb9c6b342c040a49a27a5eb3804453bae6ecc90f7ff96133595a95e8
|
||||||
extraVolumeMounts:
|
extraVolumeMounts:
|
||||||
- name: docker-vol
|
- name: docker-vol
|
||||||
mountPath: /var/lib/docker
|
mountPath: /var/lib/docker
|
||||||
|
|||||||
@@ -591,24 +591,6 @@ spec:
|
|||||||
resyncPeriod: 6h
|
resyncPeriod: 6h
|
||||||
url: http://gitea-http.gitea:3000/alexlebens/grafana-dashboards/raw/branch/main/dashboards/platform/rclone.json
|
url: http://gitea-http.gitea:3000/alexlebens/grafana-dashboards/raw/branch/main/dashboards/platform/rclone.json
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: grafana.integreatly.org/v1beta1
|
|
||||||
kind: GrafanaDashboard
|
|
||||||
metadata:
|
|
||||||
name: grafana-dashboard-vault
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: grafana-dashboard-vault
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
spec:
|
|
||||||
instanceSelector:
|
|
||||||
matchLabels:
|
|
||||||
app: grafana-main
|
|
||||||
contentCacheDuration: 6h
|
|
||||||
folderUID: grafana-folder-platform
|
|
||||||
resyncPeriod: 6h
|
|
||||||
url: http://gitea-http.gitea:3000/alexlebens/grafana-dashboards/raw/branch/main/dashboards/platform/vault.json
|
|
||||||
|
|
||||||
---
|
---
|
||||||
apiVersion: grafana.integreatly.org/v1beta1
|
apiVersion: grafana.integreatly.org/v1beta1
|
||||||
kind: GrafanaDashboard
|
kind: GrafanaDashboard
|
||||||
|
|||||||
@@ -24,4 +24,4 @@ dependencies:
|
|||||||
repository: oci://harbor.alexlebens.net/helm-charts
|
repository: oci://harbor.alexlebens.net/helm-charts
|
||||||
icon: https://cdn.jsdelivr.net/gh/selfhst/icons/png/home-assistant.png
|
icon: https://cdn.jsdelivr.net/gh/selfhst/icons/png/home-assistant.png
|
||||||
# renovate: datasource=github-releases depName=home-assistant/core
|
# renovate: datasource=github-releases depName=home-assistant/core
|
||||||
appVersion: 2026.5.3
|
appVersion: 2026.5.4
|
||||||
|
|||||||
@@ -601,18 +601,6 @@ homepage:
|
|||||||
href: https://whodb.alexlebens.net
|
href: https://whodb.alexlebens.net
|
||||||
siteMonitor: http://whodb.whodb:80
|
siteMonitor: http://whodb.whodb:80
|
||||||
statusStyle: dot
|
statusStyle: dot
|
||||||
- Secrets:
|
|
||||||
icon: sh-hashicorp-vault.webp
|
|
||||||
description: Vault
|
|
||||||
href: https://vault.alexlebens.net
|
|
||||||
siteMonitor: http://vault.vault:8200
|
|
||||||
statusStyle: dot
|
|
||||||
namespace: vault
|
|
||||||
app: vault
|
|
||||||
podSelector: >-
|
|
||||||
app.kubernetes.io/instance in (
|
|
||||||
vault
|
|
||||||
)
|
|
||||||
- Secrets:
|
- Secrets:
|
||||||
icon: sh-openbao.webp
|
icon: sh-openbao.webp
|
||||||
description: OpenBao
|
description: OpenBao
|
||||||
|
|||||||
@@ -6,4 +6,4 @@ dependencies:
|
|||||||
repository: https://grafana.github.io/helm-charts
|
repository: https://grafana.github.io/helm-charts
|
||||||
version: 1.8.1
|
version: 1.8.1
|
||||||
digest: sha256:d8d28f5f194afb6200255175add00858b150366e128f80b9d94f6e7e3dce9d4d
|
digest: sha256:d8d28f5f194afb6200255175add00858b150366e128f80b9d94f6e7e3dce9d4d
|
||||||
generated: "2026-05-22T18:33:03.536359859Z"
|
generated: "2026-05-22T19:45:18.821213515Z"
|
||||||
|
|||||||
@@ -24,4 +24,4 @@ dependencies:
|
|||||||
repository: oci://harbor.alexlebens.net/helm-charts
|
repository: oci://harbor.alexlebens.net/helm-charts
|
||||||
icon: https://cdn.jsdelivr.net/gh/selfhst/icons@main/png/music-grabber.png
|
icon: https://cdn.jsdelivr.net/gh/selfhst/icons@main/png/music-grabber.png
|
||||||
# renovate: datasource=docker depName=g33kphr33k/musicgrabber
|
# renovate: datasource=docker depName=g33kphr33k/musicgrabber
|
||||||
appVersion: 2.8.12
|
appVersion: 2.8.13
|
||||||
|
|||||||
@@ -12,7 +12,7 @@ music-grabber:
|
|||||||
main:
|
main:
|
||||||
image:
|
image:
|
||||||
repository: g33kphr33k/musicgrabber
|
repository: g33kphr33k/musicgrabber
|
||||||
tag: 2.8.12@sha256:eff4ab1009cccea2b070ac1db3c9ec4c3d359a9156c2dab7c5be247ccf7fc350
|
tag: 2.8.13@sha256:9895b8d50a732248a3ceec611c8db15d08d46438b5a3cc7932c5fa7fe2f8a6d2
|
||||||
env:
|
env:
|
||||||
- name: MUSIC_DIR
|
- name: MUSIC_DIR
|
||||||
value: /mnt/store/Music Grabber/
|
value: /mnt/store/Music Grabber/
|
||||||
|
|||||||
@@ -51,4 +51,4 @@ dependencies:
|
|||||||
repository: oci://harbor.alexlebens.net/helm-charts
|
repository: oci://harbor.alexlebens.net/helm-charts
|
||||||
icon: https://cdn.jsdelivr.net/gh/selfhst/icons/png/postiz.png
|
icon: https://cdn.jsdelivr.net/gh/selfhst/icons/png/postiz.png
|
||||||
# renovate: datasource=github-releases depName=gitroomhq/postiz-app
|
# renovate: datasource=github-releases depName=gitroomhq/postiz-app
|
||||||
appVersion: v2.21.7
|
appVersion: v2.21.8
|
||||||
|
|||||||
@@ -8,7 +8,7 @@ postiz:
|
|||||||
main:
|
main:
|
||||||
image:
|
image:
|
||||||
repository: ghcr.io/gitroomhq/postiz-app
|
repository: ghcr.io/gitroomhq/postiz-app
|
||||||
tag: v2.21.7@sha256:29a40ab11ef597c340f7f25764e7f040429c6b72c3eda33d15a429ddb66d0933
|
tag: v2.21.8@sha256:3ec7bc8ecf61f08c22e0954291702b097f944def515dc259cb3a441aba4046c0
|
||||||
env:
|
env:
|
||||||
- name: JWT_SECRET
|
- name: JWT_SECRET
|
||||||
valueFrom:
|
valueFrom:
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ searxng:
|
|||||||
main:
|
main:
|
||||||
image:
|
image:
|
||||||
repository: searxng/searxng
|
repository: searxng/searxng
|
||||||
tag: latest@sha256:18ac52ae2235032bb4ce8efaba40548411d93f52644a5cec27fded14e026cb18
|
tag: latest@sha256:4f0db332041c372dfe238ec0540f53ac055ad15cff2e179235e7fe07f1a5271f
|
||||||
env:
|
env:
|
||||||
- name: SEARXNG_BASE_URL
|
- name: SEARXNG_BASE_URL
|
||||||
value: http://searxng-api.searxng:8080
|
value: http://searxng-api.searxng:8080
|
||||||
@@ -38,7 +38,7 @@ searxng:
|
|||||||
main:
|
main:
|
||||||
image:
|
image:
|
||||||
repository: searxng/searxng
|
repository: searxng/searxng
|
||||||
tag: latest@sha256:18ac52ae2235032bb4ce8efaba40548411d93f52644a5cec27fded14e026cb18
|
tag: latest@sha256:4f0db332041c372dfe238ec0540f53ac055ad15cff2e179235e7fe07f1a5271f
|
||||||
env:
|
env:
|
||||||
- name: SEARXNG_BASE_URL
|
- name: SEARXNG_BASE_URL
|
||||||
value: https://searxng.alexlebens.net/
|
value: https://searxng.alexlebens.net/
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ site-profile:
|
|||||||
main:
|
main:
|
||||||
image:
|
image:
|
||||||
repository: harbor.alexlebens.net/images/site-profile
|
repository: harbor.alexlebens.net/images/site-profile
|
||||||
tag: 3.21.0@sha256:dae8734a45bb9fbd9a6190b6b5284563403bfd10962023d448685afc003b209c
|
tag: 3.22.0@sha256:09b0b8635385eb4a18457e0b5fc6e2396d456bf964e54dd073d3524fa29afbf0
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
cpu: 10m
|
cpu: 10m
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: tailscale-operator
|
- name: tailscale-operator
|
||||||
repository: https://pkgs.tailscale.com/helmcharts
|
repository: https://pkgs.tailscale.com/helmcharts
|
||||||
version: 1.96.5
|
version: 1.98.3
|
||||||
digest: sha256:d7352b6781e248f6fc6bbb06e994c76eed77f06b3beaac6a5707e77df72ccc7d
|
digest: sha256:b35ef32920a6099e11aadb3e6f492b2853085c1b1d57d0e421de54922bfeae05
|
||||||
generated: "2026-04-07T22:47:27.933877961Z"
|
generated: "2026-05-22T19:06:26.889427133Z"
|
||||||
|
|||||||
@@ -17,7 +17,7 @@ maintainers:
|
|||||||
- name: alexlebens
|
- name: alexlebens
|
||||||
dependencies:
|
dependencies:
|
||||||
- name: tailscale-operator
|
- name: tailscale-operator
|
||||||
version: 1.96.5
|
version: 1.98.3
|
||||||
repository: https://pkgs.tailscale.com/helmcharts
|
repository: https://pkgs.tailscale.com/helmcharts
|
||||||
icon: https://cdn.jsdelivr.net/gh/selfhst/icons/png/tailscale-light.png
|
icon: https://cdn.jsdelivr.net/gh/selfhst/icons/png/tailscale-light.png
|
||||||
# renovate: datasource=docker depName=tailscale/tailscale
|
# renovate: datasource=docker depName=tailscale/tailscale
|
||||||
|
|||||||
@@ -11,4 +11,4 @@ spec:
|
|||||||
image:
|
image:
|
||||||
repo: tailscale/k8s-nameserver
|
repo: tailscale/k8s-nameserver
|
||||||
# renovate: datasource=docker depName=tailscale/k8s-nameserver
|
# renovate: datasource=docker depName=tailscale/k8s-nameserver
|
||||||
tag: v1.96.5
|
tag: v1.98.3
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ tailscale-operator:
|
|||||||
- "tag:k8s-operator"
|
- "tag:k8s-operator"
|
||||||
image:
|
image:
|
||||||
repository: tailscale/k8s-operator
|
repository: tailscale/k8s-operator
|
||||||
tag: v1.96.5
|
tag: v1.98.3
|
||||||
digest: sha256:7956bd50dca9dc804b98720df94d112b54af85449ed0bf8cc7fad0346b225067
|
digest: sha256:7956bd50dca9dc804b98720df94d112b54af85449ed0bf8cc7fad0346b225067
|
||||||
hostname: tailscale-operator-cl01tl
|
hostname: tailscale-operator-cl01tl
|
||||||
ingressClass:
|
ingressClass:
|
||||||
|
|||||||
@@ -1,12 +0,0 @@
|
|||||||
dependencies:
|
|
||||||
- name: vault
|
|
||||||
repository: https://helm.releases.hashicorp.com
|
|
||||||
version: 0.32.0
|
|
||||||
- name: app-template
|
|
||||||
repository: https://bjw-s-labs.github.io/helm-charts/
|
|
||||||
version: 5.0.1
|
|
||||||
- name: app-template
|
|
||||||
repository: https://bjw-s-labs.github.io/helm-charts/
|
|
||||||
version: 5.0.1
|
|
||||||
digest: sha256:c555a9afad1b13f96d7a94c98182312fae388ab55b26cf177b15a0a4192e879f
|
|
||||||
generated: "2026-05-15T00:42:01.447358515Z"
|
|
||||||
@@ -1,34 +0,0 @@
|
|||||||
apiVersion: v2
|
|
||||||
name: vault
|
|
||||||
version: 1.0.0
|
|
||||||
description: Vault
|
|
||||||
keywords:
|
|
||||||
- vault
|
|
||||||
- secrets
|
|
||||||
home: https://docs.alexlebens.dev/applications/vault/
|
|
||||||
sources:
|
|
||||||
- https://github.com/hashicorp/vault
|
|
||||||
- https://github.com/Angatar/s3cmd
|
|
||||||
- https://github.com/lrstanley/vault-unseal
|
|
||||||
- https://hub.docker.com/r/hashicorp/vault
|
|
||||||
- https://hub.docker.com/r/d3fk/s3cmd/
|
|
||||||
- https://github.com/lrstanley/vault-unseal/pkgs/container/vault-unseal
|
|
||||||
- https://github.com/hashicorp/vault-helm
|
|
||||||
- https://github.com/bjw-s-labs/helm-charts/tree/main/charts/other/app-template
|
|
||||||
maintainers:
|
|
||||||
- name: alexlebens
|
|
||||||
dependencies:
|
|
||||||
- name: vault
|
|
||||||
version: 0.32.0
|
|
||||||
repository: https://helm.releases.hashicorp.com
|
|
||||||
- name: app-template
|
|
||||||
alias: snapshot
|
|
||||||
repository: https://bjw-s-labs.github.io/helm-charts/
|
|
||||||
version: 5.0.1
|
|
||||||
- name: app-template
|
|
||||||
alias: unseal
|
|
||||||
repository: https://bjw-s-labs.github.io/helm-charts/
|
|
||||||
version: 5.0.1
|
|
||||||
icon: https://cdn.jsdelivr.net/gh/selfhst/icons@main/png/hashicorp-vault.png
|
|
||||||
# renovate: datasource=github-releases depName=hashicorp/vault
|
|
||||||
appVersion: 2.0.1
|
|
||||||
@@ -1,21 +0,0 @@
|
|||||||
{{/*
|
|
||||||
Common labels
|
|
||||||
*/}}
|
|
||||||
{{- define "custom.labels" -}}
|
|
||||||
{{ include "custom.selectorLabels" $ }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{/*
|
|
||||||
Selector labels
|
|
||||||
*/}}
|
|
||||||
{{- define "custom.selectorLabels" -}}
|
|
||||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
|
||||||
app.kubernetes.io/part-of: {{ .Release.Name }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{/*
|
|
||||||
ServiceAccount names
|
|
||||||
*/}}
|
|
||||||
{{- define "custom.serviceAccountName" -}}
|
|
||||||
vault
|
|
||||||
{{- end -}}
|
|
||||||
@@ -1,49 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: ConfigMap
|
|
||||||
metadata:
|
|
||||||
name: vault-snapshot-script
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: vault-snapshot-script
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
data:
|
|
||||||
snapshot.sh: |
|
|
||||||
DATE=$(date +"%Y%m%d-%H-%M")
|
|
||||||
|
|
||||||
echo " "
|
|
||||||
echo ">> Running Vault Snapshot Script ..."
|
|
||||||
|
|
||||||
echo " "
|
|
||||||
echo ">> Fetching Vault token ..."
|
|
||||||
export VAULT_TOKEN=$(vault write -field=token auth/approle/login role_id=$VAULT_APPROLE_ROLE_ID secret_id=$VAULT_APPROLE_SECRET_ID)
|
|
||||||
|
|
||||||
if [ -z "$VAULT_TOKEN" ]; then
|
|
||||||
echo ">> ERROR: Failed to fetch Vault token! Exiting..."
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
echo " "
|
|
||||||
echo ">> Taking Vault snapshot ..."
|
|
||||||
vault operator raft snapshot save /opt/backup/vault-snapshot-$DATE.snap
|
|
||||||
|
|
||||||
echo " "
|
|
||||||
echo ">> Setting ownership of Vault snapshot ..."
|
|
||||||
chown 100:1000 /opt/backup/vault-snapshot-$DATE.snap
|
|
||||||
|
|
||||||
echo " "
|
|
||||||
echo ">> Completed Vault snapshot"
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: v1
|
|
||||||
kind: ConfigMap
|
|
||||||
metadata:
|
|
||||||
name: vault-backup-script
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: vault-backup-script
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
data:
|
|
||||||
backup.sh: |
|
|
||||||
echo " ";
|
|
||||||
echo ">> Running S3 backup for Vault snapshot";
|
|
||||||
OUTPUT=$(s3cmd sync --no-check-certificate -v /opt/backup/* "${BUCKET}/cl01tl/cl01tl-vault-snapshots/" 2>&1)
|
|
||||||
@@ -1,215 +0,0 @@
|
|||||||
apiVersion: external-secrets.io/v1
|
|
||||||
kind: ExternalSecret
|
|
||||||
metadata:
|
|
||||||
name: vault-token
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: vault-token
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
spec:
|
|
||||||
secretStoreRef:
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
name: openbao
|
|
||||||
data:
|
|
||||||
- secretKey: token
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/vault/token
|
|
||||||
property: root
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: external-secrets.io/v1
|
|
||||||
kind: ExternalSecret
|
|
||||||
metadata:
|
|
||||||
name: vault-snapshot-agent-role
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: vault-snapshot-agent-role
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
spec:
|
|
||||||
secretStoreRef:
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
name: openbao
|
|
||||||
data:
|
|
||||||
- secretKey: VAULT_APPROLE_ROLE_ID
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/vault/role/snapshot
|
|
||||||
property: role-id
|
|
||||||
- secretKey: VAULT_APPROLE_SECRET_ID
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/vault/role/snapshot
|
|
||||||
property: secret-id
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: external-secrets.io/v1
|
|
||||||
kind: ExternalSecret
|
|
||||||
metadata:
|
|
||||||
name: vault-backup-local-config
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: vault-backup-local-config
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
spec:
|
|
||||||
secretStoreRef:
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
name: openbao
|
|
||||||
data:
|
|
||||||
- secretKey: BUCKET
|
|
||||||
remoteRef:
|
|
||||||
key: /garage/home-infra/vault-backups
|
|
||||||
property: BUCKET_PATH
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: external-secrets.io/v1
|
|
||||||
kind: ExternalSecret
|
|
||||||
metadata:
|
|
||||||
name: vault-backup-remote-config
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: vault-backup-remote-config
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
spec:
|
|
||||||
secretStoreRef:
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
name: openbao
|
|
||||||
data:
|
|
||||||
- secretKey: BUCKET
|
|
||||||
remoteRef:
|
|
||||||
key: /garage/home-infra/vault-backups
|
|
||||||
property: BUCKET_PATH
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: external-secrets.io/v1
|
|
||||||
kind: ExternalSecret
|
|
||||||
metadata:
|
|
||||||
name: vault-unseal-config-1
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: vault-unseal-config-1
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
spec:
|
|
||||||
secretStoreRef:
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
name: openbao
|
|
||||||
data:
|
|
||||||
- secretKey: ENVIRONMENT
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/vault/unseal
|
|
||||||
property: environment
|
|
||||||
- secretKey: NODES
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/vault/unseal
|
|
||||||
property: nodes
|
|
||||||
- secretKey: TOKENS
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/vault/unseal
|
|
||||||
property: tokens-1
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: external-secrets.io/v1
|
|
||||||
kind: ExternalSecret
|
|
||||||
metadata:
|
|
||||||
name: vault-unseal-config-2
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: vault-unseal-config-2
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
spec:
|
|
||||||
secretStoreRef:
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
name: openbao
|
|
||||||
data:
|
|
||||||
- secretKey: ENVIRONMENT
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/vault/unseal
|
|
||||||
property: environment
|
|
||||||
- secretKey: NODES
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/vault/unseal
|
|
||||||
property: nodes
|
|
||||||
- secretKey: TOKENS
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/vault/unseal
|
|
||||||
property: tokens-2
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: external-secrets.io/v1
|
|
||||||
kind: ExternalSecret
|
|
||||||
metadata:
|
|
||||||
name: vault-unseal-config-3
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: vault-unseal-config-3
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
spec:
|
|
||||||
secretStoreRef:
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
name: openbao
|
|
||||||
data:
|
|
||||||
- secretKey: ENVIRONMENT
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/vault/unseal
|
|
||||||
property: environment
|
|
||||||
- secretKey: NODES
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/vault/unseal
|
|
||||||
property: nodes
|
|
||||||
- secretKey: TOKENS
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/vault/unseal
|
|
||||||
property: tokens-3
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: external-secrets.io/v1
|
|
||||||
kind: ExternalSecret
|
|
||||||
metadata:
|
|
||||||
name: vault-ntfy-config
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: vault-ntfy-config
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
spec:
|
|
||||||
secretStoreRef:
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
name: openbao
|
|
||||||
data:
|
|
||||||
- secretKey: NTFY_TOKEN
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/ntfy/users/cl01tl
|
|
||||||
property: token
|
|
||||||
- secretKey: NTFY_ENDPOINT
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/ntfy/config
|
|
||||||
property: internal-endpoint
|
|
||||||
- secretKey: NTFY_TOPIC
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/ntfy/topics
|
|
||||||
property: vault
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: external-secrets.io/v1
|
|
||||||
kind: ExternalSecret
|
|
||||||
metadata:
|
|
||||||
name: vault-ntfy-unseal-config
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: vault-ntfy-unseal-config
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
spec:
|
|
||||||
secretStoreRef:
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
name: openbao
|
|
||||||
target:
|
|
||||||
template:
|
|
||||||
mergePolicy: Merge
|
|
||||||
engineVersion: v2
|
|
||||||
data:
|
|
||||||
NOTIFY_QUEUE_URLS: "{{ `{{ .endpoint }}` }}/{{ `{{ .topic }}` }}/?priority=4&tags=vault,unseal&title=Vault+Unsealed"
|
|
||||||
data:
|
|
||||||
- secretKey: endpoint
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/ntfy/users/cl01tl
|
|
||||||
property: internal-endpoint-credential
|
|
||||||
- secretKey: topic
|
|
||||||
remoteRef:
|
|
||||||
key: /cl01tl/ntfy/topics
|
|
||||||
property: vault
|
|
||||||
@@ -1,26 +0,0 @@
|
|||||||
apiVersion: gateway.networking.k8s.io/v1
|
|
||||||
kind: HTTPRoute
|
|
||||||
metadata:
|
|
||||||
name: vault
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: vault
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
spec:
|
|
||||||
parentRefs:
|
|
||||||
- group: gateway.networking.k8s.io
|
|
||||||
kind: Gateway
|
|
||||||
name: traefik-gateway
|
|
||||||
namespace: traefik
|
|
||||||
hostnames:
|
|
||||||
- vault.alexlebens.net
|
|
||||||
rules:
|
|
||||||
- matches:
|
|
||||||
- path:
|
|
||||||
type: PathPrefix
|
|
||||||
value: /
|
|
||||||
backendRefs:
|
|
||||||
- group: ''
|
|
||||||
kind: Service
|
|
||||||
name: vault-active
|
|
||||||
port: 8200
|
|
||||||
@@ -1,28 +0,0 @@
|
|||||||
apiVersion: networking.k8s.io/v1
|
|
||||||
kind: Ingress
|
|
||||||
metadata:
|
|
||||||
name: vault-tailscale
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: vault-tailscale
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
tailscale.com/proxy-class: no-metrics
|
|
||||||
annotations:
|
|
||||||
tailscale.com/experimental-forward-cluster-traffic-via-ingress: "true"
|
|
||||||
spec:
|
|
||||||
ingressClassName: tailscale
|
|
||||||
tls:
|
|
||||||
- hosts:
|
|
||||||
- vault-cl01tl
|
|
||||||
secretName: vault-cl01tl
|
|
||||||
rules:
|
|
||||||
- host: vault-cl01tl
|
|
||||||
http:
|
|
||||||
paths:
|
|
||||||
- path: /
|
|
||||||
pathType: Prefix
|
|
||||||
backend:
|
|
||||||
service:
|
|
||||||
name: vault-active
|
|
||||||
port:
|
|
||||||
number: 8200
|
|
||||||
@@ -1,16 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: PersistentVolumeClaim
|
|
||||||
metadata:
|
|
||||||
name: vault-storage-backup
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: vault-storage-backup
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
spec:
|
|
||||||
volumeMode: Filesystem
|
|
||||||
storageClassName: ceph-filesystem
|
|
||||||
accessModes:
|
|
||||||
- ReadWriteMany
|
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
storage: 1Gi
|
|
||||||
@@ -1,38 +0,0 @@
|
|||||||
apiVersion: secrets-store.csi.x-k8s.io/v1
|
|
||||||
kind: SecretProviderClass
|
|
||||||
metadata:
|
|
||||||
name: vault-backup-local-config
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: vault-backup-local-config
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
spec:
|
|
||||||
provider: openbao
|
|
||||||
parameters:
|
|
||||||
baoAddress: "http://openbao-internal.openbao:8200"
|
|
||||||
roleName: vault
|
|
||||||
objects: |
|
|
||||||
- objectName: .s3cfg
|
|
||||||
fileName: .s3cfg
|
|
||||||
secretPath: secret/data/garage/home-infra/vault-backups
|
|
||||||
secretKey: s3cfg-local
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: secrets-store.csi.x-k8s.io/v1
|
|
||||||
kind: SecretProviderClass
|
|
||||||
metadata:
|
|
||||||
name: vault-backup-remote-config
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: vault-backup-remote-config
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
spec:
|
|
||||||
provider: openbao
|
|
||||||
parameters:
|
|
||||||
baoAddress: "http://openbao-internal.openbao:8200"
|
|
||||||
roleName: vault
|
|
||||||
objects: |
|
|
||||||
- objectName: .s3cfg
|
|
||||||
fileName: .s3cfg
|
|
||||||
secretPath: secret/data/garage/home-infra/vault-backups
|
|
||||||
secretKey: s3cfg-remote
|
|
||||||
@@ -1,8 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: ServiceAccount
|
|
||||||
metadata:
|
|
||||||
name: {{ include "custom.serviceAccountName" . }}
|
|
||||||
namespace: {{ .Release.Namespace }}
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: {{ include "custom.serviceAccountName" . }}
|
|
||||||
{{- include "custom.labels" . | nindent 4 }}
|
|
||||||
@@ -1,314 +0,0 @@
|
|||||||
vault:
|
|
||||||
global:
|
|
||||||
serverTelemetry:
|
|
||||||
prometheusOperator: true
|
|
||||||
injector:
|
|
||||||
enabled: false
|
|
||||||
server:
|
|
||||||
enabled: true
|
|
||||||
image:
|
|
||||||
repository: hashicorp/vault
|
|
||||||
tag: 2.0.1@sha256:7553550027156b8f04e81f61a98c3f53a7bce57104f2a400e2012c851f66ac19
|
|
||||||
updateStrategyType: RollingUpdate
|
|
||||||
logLevel: debug
|
|
||||||
logFormat: standard
|
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
cpu: 50m
|
|
||||||
memory: 512Mi
|
|
||||||
authDelegator:
|
|
||||||
enabled: false
|
|
||||||
livenessProbe:
|
|
||||||
enabled: false
|
|
||||||
volumes:
|
|
||||||
- name: vault-storage-backup
|
|
||||||
persistentVolumeClaim:
|
|
||||||
claimName: vault-storage-backup
|
|
||||||
volumeMounts:
|
|
||||||
- mountPath: /opt/backups/
|
|
||||||
name: vault-storage-backup
|
|
||||||
readOnly: false
|
|
||||||
dataStorage:
|
|
||||||
size: 1Gi
|
|
||||||
storageClass: ceph-block
|
|
||||||
auditStorage:
|
|
||||||
enabled: false
|
|
||||||
size: 5Gi
|
|
||||||
storageClass: ceph-block
|
|
||||||
standalone:
|
|
||||||
enabled: false
|
|
||||||
ha:
|
|
||||||
enabled: true
|
|
||||||
raft:
|
|
||||||
enabled: true
|
|
||||||
config: |
|
|
||||||
ui = true
|
|
||||||
|
|
||||||
listener "tcp" {
|
|
||||||
tls_disable = 1
|
|
||||||
address = "[::]:8200"
|
|
||||||
cluster_address = "[::]:8201"
|
|
||||||
telemetry {
|
|
||||||
unauthenticated_metrics_access = "true"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
storage "raft" {
|
|
||||||
path = "/vault/data"
|
|
||||||
retry_join {
|
|
||||||
leader_api_addr = "http://vault-0.vault-internal:8200"
|
|
||||||
}
|
|
||||||
retry_join {
|
|
||||||
leader_api_addr = "http://vault-1.vault-internal:8200"
|
|
||||||
}
|
|
||||||
retry_join {
|
|
||||||
leader_api_addr = "http://vault-2.vault-internal:8200"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
service_registration "kubernetes" {}
|
|
||||||
|
|
||||||
telemetry {
|
|
||||||
prometheus_retention_time = "30s"
|
|
||||||
disable_hostname = true
|
|
||||||
}
|
|
||||||
disruptionBudget:
|
|
||||||
enabled: true
|
|
||||||
maxUnavailable: 1
|
|
||||||
serverTelemetry:
|
|
||||||
serviceMonitor:
|
|
||||||
enabled: true
|
|
||||||
prometheusRules:
|
|
||||||
enabled: true
|
|
||||||
rules:
|
|
||||||
- alert: vault-HighResponseTime
|
|
||||||
annotations:
|
|
||||||
message: The response time of Vault is over 500ms on average over the last 5 minutes.
|
|
||||||
expr: vault_core_handle_request{quantile="0.5", namespace="mynamespace"} > 500
|
|
||||||
for: 5m
|
|
||||||
labels:
|
|
||||||
severity: warning
|
|
||||||
- alert: vault-HighResponseTime
|
|
||||||
annotations:
|
|
||||||
message: The response time of Vault is over 1s on average over the last 5 minutes.
|
|
||||||
expr: vault_core_handle_request{quantile="0.5", namespace="mynamespace"} > 1000
|
|
||||||
for: 5m
|
|
||||||
labels:
|
|
||||||
severity: critical
|
|
||||||
snapshot:
|
|
||||||
global:
|
|
||||||
fullnameOverride: vault-snapshot
|
|
||||||
controllers:
|
|
||||||
snapshot:
|
|
||||||
type: cronjob
|
|
||||||
pod:
|
|
||||||
automountServiceAccountToken: true
|
|
||||||
cronjob:
|
|
||||||
suspend: false
|
|
||||||
timeZone: America/Chicago
|
|
||||||
schedule: 0 4 * * *
|
|
||||||
backoffLimit: 3
|
|
||||||
parallelism: 1
|
|
||||||
initContainers:
|
|
||||||
snapshot:
|
|
||||||
image:
|
|
||||||
repository: hashicorp/vault
|
|
||||||
tag: 2.0.1@sha256:7553550027156b8f04e81f61a98c3f53a7bce57104f2a400e2012c851f66ac19
|
|
||||||
command:
|
|
||||||
- /bin/ash
|
|
||||||
args:
|
|
||||||
- -ec
|
|
||||||
- /scripts/snapshot.sh
|
|
||||||
envFrom:
|
|
||||||
- secretRef:
|
|
||||||
name: vault-snapshot-agent-role
|
|
||||||
env:
|
|
||||||
- name: VAULT_ADDR
|
|
||||||
value: http://vault-active.vault.svc.cluster.local:8200
|
|
||||||
containers:
|
|
||||||
s3-backup-local:
|
|
||||||
image:
|
|
||||||
repository: d3fk/s3cmd
|
|
||||||
tag: latest@sha256:d66cc5677b30b31a7981f9fde0af064a9072e8b8a57d5e9b4cc02f44f02acbf2
|
|
||||||
command:
|
|
||||||
- /bin/sh
|
|
||||||
args:
|
|
||||||
- -ec
|
|
||||||
- /scripts/backup.sh
|
|
||||||
envFrom:
|
|
||||||
- secretRef:
|
|
||||||
name: vault-ntfy-config
|
|
||||||
env:
|
|
||||||
- name: BUCKET
|
|
||||||
valueFrom:
|
|
||||||
secretKeyRef:
|
|
||||||
name: vault-backup-local-config
|
|
||||||
key: BUCKET
|
|
||||||
- name: TARGET
|
|
||||||
value: Local
|
|
||||||
s3-backup-remote:
|
|
||||||
image:
|
|
||||||
repository: d3fk/s3cmd
|
|
||||||
tag: latest@sha256:d66cc5677b30b31a7981f9fde0af064a9072e8b8a57d5e9b4cc02f44f02acbf2
|
|
||||||
command:
|
|
||||||
- /bin/sh
|
|
||||||
args:
|
|
||||||
- -ec
|
|
||||||
- /scripts/backup.sh
|
|
||||||
envFrom:
|
|
||||||
- secretRef:
|
|
||||||
name: vault-ntfy-config
|
|
||||||
env:
|
|
||||||
- name: BUCKET
|
|
||||||
valueFrom:
|
|
||||||
secretKeyRef:
|
|
||||||
name: vault-backup-remote-config
|
|
||||||
key: BUCKET
|
|
||||||
- name: TARGET
|
|
||||||
value: Remote
|
|
||||||
persistence:
|
|
||||||
snapshot-script:
|
|
||||||
enabled: true
|
|
||||||
type: configMap
|
|
||||||
name: vault-snapshot-script
|
|
||||||
defaultMode: 0755
|
|
||||||
advancedMounts:
|
|
||||||
snapshot:
|
|
||||||
snapshot:
|
|
||||||
- path: /scripts/snapshot.sh
|
|
||||||
subPath: snapshot.sh
|
|
||||||
backup-script:
|
|
||||||
enabled: true
|
|
||||||
type: configMap
|
|
||||||
name: vault-backup-script
|
|
||||||
defaultMode: 0755
|
|
||||||
advancedMounts:
|
|
||||||
snapshot:
|
|
||||||
s3-backup-local:
|
|
||||||
- path: /scripts/backup.sh
|
|
||||||
subPath: backup.sh
|
|
||||||
s3-backup-remote:
|
|
||||||
- path: /scripts/backup.sh
|
|
||||||
subPath: backup.sh
|
|
||||||
s3-backup-external:
|
|
||||||
- path: /scripts/backup.sh
|
|
||||||
subPath: backup.sh
|
|
||||||
backup-local-config:
|
|
||||||
type: custom
|
|
||||||
volumeSpec:
|
|
||||||
csi:
|
|
||||||
driver: secrets-store.csi.k8s.io
|
|
||||||
readOnly: true
|
|
||||||
volumeAttributes:
|
|
||||||
secretProviderClass: vault-backup-local-config
|
|
||||||
advancedMounts:
|
|
||||||
snapshot:
|
|
||||||
s3-backup-local:
|
|
||||||
- path: /root/.s3cfg
|
|
||||||
readOnly: true
|
|
||||||
mountPropagation: None
|
|
||||||
subPath: .s3cfg
|
|
||||||
backup-remote-config:
|
|
||||||
type: custom
|
|
||||||
volumeSpec:
|
|
||||||
csi:
|
|
||||||
driver: secrets-store.csi.k8s.io
|
|
||||||
readOnly: true
|
|
||||||
volumeAttributes:
|
|
||||||
secretProviderClass: vault-backup-remote-config
|
|
||||||
advancedMounts:
|
|
||||||
snapshot:
|
|
||||||
s3-backup-remote:
|
|
||||||
- path: /root/.s3cfg
|
|
||||||
readOnly: true
|
|
||||||
mountPropagation: None
|
|
||||||
subPath: .s3cfg
|
|
||||||
backup-external-config:
|
|
||||||
type: custom
|
|
||||||
volumeSpec:
|
|
||||||
csi:
|
|
||||||
driver: secrets-store.csi.k8s.io
|
|
||||||
readOnly: true
|
|
||||||
volumeAttributes:
|
|
||||||
secretProviderClass: vault-backup-external-config
|
|
||||||
advancedMounts:
|
|
||||||
snapshot:
|
|
||||||
s3-backup-external:
|
|
||||||
- path: /root/.s3cfg
|
|
||||||
readOnly: true
|
|
||||||
mountPropagation: None
|
|
||||||
subPath: .s3cfg
|
|
||||||
backup:
|
|
||||||
existingClaim: vault-storage-backup
|
|
||||||
advancedMounts:
|
|
||||||
snapshot:
|
|
||||||
snapshot:
|
|
||||||
- path: /opt/backup
|
|
||||||
readOnly: false
|
|
||||||
s3-backup-local:
|
|
||||||
- path: /opt/backup
|
|
||||||
readOnly: false
|
|
||||||
s3-backup-remote:
|
|
||||||
- path: /opt/backup
|
|
||||||
readOnly: false
|
|
||||||
s3-backup-external:
|
|
||||||
- path: /opt/backup
|
|
||||||
readOnly: false
|
|
||||||
unseal:
|
|
||||||
global:
|
|
||||||
fullnameOverride: vault-unseal
|
|
||||||
controllers:
|
|
||||||
unseal-1:
|
|
||||||
type: deployment
|
|
||||||
replicas: 1
|
|
||||||
strategy: Recreate
|
|
||||||
containers:
|
|
||||||
main:
|
|
||||||
image:
|
|
||||||
repository: ghcr.io/lrstanley/vault-unseal
|
|
||||||
tag: 1.0.0@sha256:9b936fadc8dea2a473972806bffc218a4dd2fbc3b373566138a60e058cc544aa
|
|
||||||
envFrom:
|
|
||||||
- secretRef:
|
|
||||||
name: vault-unseal-config-1
|
|
||||||
- secretRef:
|
|
||||||
name: vault-ntfy-unseal-config
|
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
cpu: 1m
|
|
||||||
memory: 10Mi
|
|
||||||
unseal-2:
|
|
||||||
type: deployment
|
|
||||||
replicas: 1
|
|
||||||
strategy: Recreate
|
|
||||||
containers:
|
|
||||||
main:
|
|
||||||
image:
|
|
||||||
repository: ghcr.io/lrstanley/vault-unseal
|
|
||||||
tag: 1.0.0@sha256:9b936fadc8dea2a473972806bffc218a4dd2fbc3b373566138a60e058cc544aa
|
|
||||||
envFrom:
|
|
||||||
- secretRef:
|
|
||||||
name: vault-unseal-config-2
|
|
||||||
- secretRef:
|
|
||||||
name: vault-ntfy-unseal-config
|
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
cpu: 1m
|
|
||||||
memory: 10Mi
|
|
||||||
unseal-3:
|
|
||||||
type: deployment
|
|
||||||
replicas: 1
|
|
||||||
strategy: Recreate
|
|
||||||
containers:
|
|
||||||
main:
|
|
||||||
image:
|
|
||||||
repository: ghcr.io/lrstanley/vault-unseal
|
|
||||||
tag: 1.0.0@sha256:9b936fadc8dea2a473972806bffc218a4dd2fbc3b373566138a60e058cc544aa
|
|
||||||
envFrom:
|
|
||||||
- secretRef:
|
|
||||||
name: vault-unseal-config-3
|
|
||||||
- secretRef:
|
|
||||||
name: vault-ntfy-unseal-config
|
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
cpu: 1m
|
|
||||||
memory: 10Mi
|
|
||||||
@@ -1,6 +1,6 @@
|
|||||||
services:
|
services:
|
||||||
tailscale-invoke-ai:
|
tailscale-invoke-ai:
|
||||||
image: ghcr.io/tailscale/tailscale:v1.96.5@sha256:dbeff02d2337344b351afac203427218c4d0a06c43fc10a865184063498472a6
|
image: ghcr.io/tailscale/tailscale:v1.98.3@sha256:854b77123b9536adae2e97f5a5fdb1790ed03438b911ab7f07780155e0af6ce2
|
||||||
container_name: tailscale-invoke-ai
|
container_name: tailscale-invoke-ai
|
||||||
cap_add:
|
cap_add:
|
||||||
- net_admin
|
- net_admin
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
services:
|
services:
|
||||||
tailscale-ollama:
|
tailscale-ollama:
|
||||||
image: ghcr.io/tailscale/tailscale:v1.96.5@sha256:dbeff02d2337344b351afac203427218c4d0a06c43fc10a865184063498472a6
|
image: ghcr.io/tailscale/tailscale:v1.98.3@sha256:854b77123b9536adae2e97f5a5fdb1790ed03438b911ab7f07780155e0af6ce2
|
||||||
container_name: tailscale-ollama
|
container_name: tailscale-ollama
|
||||||
cap_add:
|
cap_add:
|
||||||
- net_admin
|
- net_admin
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
services:
|
services:
|
||||||
tailscale-stable-diffusion:
|
tailscale-stable-diffusion:
|
||||||
image: ghcr.io/tailscale/tailscale:v1.96.5@sha256:dbeff02d2337344b351afac203427218c4d0a06c43fc10a865184063498472a6
|
image: ghcr.io/tailscale/tailscale:v1.98.3@sha256:854b77123b9536adae2e97f5a5fdb1790ed03438b911ab7f07780155e0af6ce2
|
||||||
container_name: tailscale-stable-diffusion
|
container_name: tailscale-stable-diffusion
|
||||||
cap_add:
|
cap_add:
|
||||||
- net_admin
|
- net_admin
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
services:
|
services:
|
||||||
tailscale-blocky:
|
tailscale-blocky:
|
||||||
image: ghcr.io/tailscale/tailscale:v1.96.5@sha256:dbeff02d2337344b351afac203427218c4d0a06c43fc10a865184063498472a6
|
image: ghcr.io/tailscale/tailscale:v1.98.3@sha256:854b77123b9536adae2e97f5a5fdb1790ed03438b911ab7f07780155e0af6ce2
|
||||||
container_name: tailscale-blocky
|
container_name: tailscale-blocky
|
||||||
cap_add:
|
cap_add:
|
||||||
- net_admin
|
- net_admin
|
||||||
|
|||||||
@@ -142,7 +142,6 @@ customDNS:
|
|||||||
sparkyfitness IN CNAME traefik-cl01tl
|
sparkyfitness IN CNAME traefik-cl01tl
|
||||||
tdarr IN CNAME traefik-cl01tl
|
tdarr IN CNAME traefik-cl01tl
|
||||||
tubearchivist IN CNAME traefik-cl01tl
|
tubearchivist IN CNAME traefik-cl01tl
|
||||||
vault IN CNAME traefik-cl01tl
|
|
||||||
whodb IN CNAME traefik-cl01tl
|
whodb IN CNAME traefik-cl01tl
|
||||||
yamtrack IN CNAME traefik-cl01tl
|
yamtrack IN CNAME traefik-cl01tl
|
||||||
yubal IN CNAME traefik-cl01tl
|
yubal IN CNAME traefik-cl01tl
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
services:
|
services:
|
||||||
tailscale-blocky:
|
tailscale-blocky:
|
||||||
image: ghcr.io/tailscale/tailscale:v1.96.5@sha256:dbeff02d2337344b351afac203427218c4d0a06c43fc10a865184063498472a6
|
image: ghcr.io/tailscale/tailscale:v1.98.3@sha256:854b77123b9536adae2e97f5a5fdb1790ed03438b911ab7f07780155e0af6ce2
|
||||||
container_name: tailscale-blocky
|
container_name: tailscale-blocky
|
||||||
cap_add:
|
cap_add:
|
||||||
- net_admin
|
- net_admin
|
||||||
|
|||||||
@@ -163,7 +163,6 @@ customDNS:
|
|||||||
sparkyfitness IN CNAME traefik-cl01tl
|
sparkyfitness IN CNAME traefik-cl01tl
|
||||||
tdarr IN CNAME traefik-cl01tl
|
tdarr IN CNAME traefik-cl01tl
|
||||||
tubearchivist IN CNAME traefik-cl01tl
|
tubearchivist IN CNAME traefik-cl01tl
|
||||||
vault IN CNAME traefik-cl01tl
|
|
||||||
whodb IN CNAME traefik-cl01tl
|
whodb IN CNAME traefik-cl01tl
|
||||||
yamtrack IN CNAME traefik-cl01tl
|
yamtrack IN CNAME traefik-cl01tl
|
||||||
yubal IN CNAME traefik-cl01tl
|
yubal IN CNAME traefik-cl01tl
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
services:
|
services:
|
||||||
tailscale-blocky:
|
tailscale-blocky:
|
||||||
image: ghcr.io/tailscale/tailscale:v1.96.5@sha256:dbeff02d2337344b351afac203427218c4d0a06c43fc10a865184063498472a6
|
image: ghcr.io/tailscale/tailscale:v1.98.3@sha256:854b77123b9536adae2e97f5a5fdb1790ed03438b911ab7f07780155e0af6ce2
|
||||||
container_name: tailscale-blocky
|
container_name: tailscale-blocky
|
||||||
cap_add:
|
cap_add:
|
||||||
- net_admin
|
- net_admin
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
services:
|
services:
|
||||||
tailscale-garage:
|
tailscale-garage:
|
||||||
image: ghcr.io/tailscale/tailscale:v1.96.5@sha256:dbeff02d2337344b351afac203427218c4d0a06c43fc10a865184063498472a6
|
image: ghcr.io/tailscale/tailscale:v1.98.3@sha256:854b77123b9536adae2e97f5a5fdb1790ed03438b911ab7f07780155e0af6ce2
|
||||||
container_name: tailscale-garage
|
container_name: tailscale-garage
|
||||||
cap_add:
|
cap_add:
|
||||||
- net_admin
|
- net_admin
|
||||||
@@ -20,7 +20,7 @@ services:
|
|||||||
- /dev/net/tun:/dev/net/tun
|
- /dev/net/tun:/dev/net/tun
|
||||||
|
|
||||||
tailscale-garage-ui:
|
tailscale-garage-ui:
|
||||||
image: ghcr.io/tailscale/tailscale:v1.96.5@sha256:dbeff02d2337344b351afac203427218c4d0a06c43fc10a865184063498472a6
|
image: ghcr.io/tailscale/tailscale:v1.98.3@sha256:854b77123b9536adae2e97f5a5fdb1790ed03438b911ab7f07780155e0af6ce2
|
||||||
container_name: tailscale-garage-ui
|
container_name: tailscale-garage-ui
|
||||||
cap_add:
|
cap_add:
|
||||||
- net_admin
|
- net_admin
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
services:
|
services:
|
||||||
tailscale-gitea:
|
tailscale-gitea:
|
||||||
image: ghcr.io/tailscale/tailscale:v1.96.5@sha256:dbeff02d2337344b351afac203427218c4d0a06c43fc10a865184063498472a6
|
image: ghcr.io/tailscale/tailscale:v1.98.3@sha256:854b77123b9536adae2e97f5a5fdb1790ed03438b911ab7f07780155e0af6ce2
|
||||||
container_name: tailscale-gitea
|
container_name: tailscale-gitea
|
||||||
cap_add:
|
cap_add:
|
||||||
- net_admin
|
- net_admin
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
services:
|
services:
|
||||||
tailscale-homepage:
|
tailscale-homepage:
|
||||||
image: ghcr.io/tailscale/tailscale:v1.96.5@sha256:dbeff02d2337344b351afac203427218c4d0a06c43fc10a865184063498472a6
|
image: ghcr.io/tailscale/tailscale:v1.98.3@sha256:854b77123b9536adae2e97f5a5fdb1790ed03438b911ab7f07780155e0af6ce2
|
||||||
container_name: tailscale-homepage
|
container_name: tailscale-homepage
|
||||||
cap_add:
|
cap_add:
|
||||||
- net_admin
|
- net_admin
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
services:
|
services:
|
||||||
tailscale-komodo-periphery:
|
tailscale-komodo-periphery:
|
||||||
image: ghcr.io/tailscale/tailscale:v1.96.5@sha256:dbeff02d2337344b351afac203427218c4d0a06c43fc10a865184063498472a6
|
image: ghcr.io/tailscale/tailscale:v1.98.3@sha256:854b77123b9536adae2e97f5a5fdb1790ed03438b911ab7f07780155e0af6ce2
|
||||||
container_name: tailscale-komodo-periphery
|
container_name: tailscale-komodo-periphery
|
||||||
cap_add:
|
cap_add:
|
||||||
- net_admin
|
- net_admin
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
services:
|
services:
|
||||||
tailscale-node-exporter:
|
tailscale-node-exporter:
|
||||||
image: ghcr.io/tailscale/tailscale:v1.96.5@sha256:dbeff02d2337344b351afac203427218c4d0a06c43fc10a865184063498472a6
|
image: ghcr.io/tailscale/tailscale:v1.98.3@sha256:854b77123b9536adae2e97f5a5fdb1790ed03438b911ab7f07780155e0af6ce2
|
||||||
container_name: tailscale-node-exporter
|
container_name: tailscale-node-exporter
|
||||||
cap_add:
|
cap_add:
|
||||||
- net_admin
|
- net_admin
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
services:
|
services:
|
||||||
tailscale:
|
tailscale:
|
||||||
image: ghcr.io/tailscale/tailscale:v1.96.5@sha256:dbeff02d2337344b351afac203427218c4d0a06c43fc10a865184063498472a6
|
image: ghcr.io/tailscale/tailscale:v1.98.3@sha256:854b77123b9536adae2e97f5a5fdb1790ed03438b911ab7f07780155e0af6ce2
|
||||||
container_name: tailscale-subnet
|
container_name: tailscale-subnet
|
||||||
cap_add:
|
cap_add:
|
||||||
- net_admin
|
- net_admin
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
services:
|
services:
|
||||||
tailscale-traefik:
|
tailscale-traefik:
|
||||||
image: ghcr.io/tailscale/tailscale:v1.96.5@sha256:dbeff02d2337344b351afac203427218c4d0a06c43fc10a865184063498472a6
|
image: ghcr.io/tailscale/tailscale:v1.98.3@sha256:854b77123b9536adae2e97f5a5fdb1790ed03438b911ab7f07780155e0af6ce2
|
||||||
container_name: tailscale-traefik
|
container_name: tailscale-traefik
|
||||||
cap_add:
|
cap_add:
|
||||||
- net_admin
|
- net_admin
|
||||||
|
|||||||
Reference in New Issue
Block a user