From 8a5a49cdfdc09d871e77d0e9ef6a362ec89df042 Mon Sep 17 00:00:00 2001 From: gitea-bot Date: Tue, 24 Mar 2026 01:51:03 +0000 Subject: [PATCH] chore: Update manifests after change --- .../Deployment-audiobookshelf.yaml | 3 + .../manifests/blocky/ConfigMap-blocky.yaml | 1 + .../manifests/blocky/Deployment-blocky.yaml | 2 +- .../manifests/gatus/ConfigMap-gatus.yaml | 9 ++ .../manifests/gatus/Deployment-gatus.yaml | 2 +- ...ase-grimmory-mariadb-cluster-booklore.yaml | 20 +++++ .../grimmory/Deployment-grimmory.yaml | 88 +++++++++++++++++++ ...t-booklore-config-backup-secret-local.yaml | 55 ++++++++++++ ...rimmory-config-backup-secret-external.yaml | 58 ++++++++++++ ...t-grimmory-config-backup-secret-local.yaml | 58 ++++++++++++ ...-grimmory-config-backup-secret-remote.yaml | 58 ++++++++++++ ...cret-grimmory-data-replication-secret.yaml | 18 ++++ ...ternalSecret-grimmory-database-secret.yaml | 18 ++++ ...ariadb-cluster-backup-secret-external.yaml | 22 +++++ ...-mariadb-cluster-backup-secret-garage.yaml | 22 +++++ ...ant-grimmory-mariadb-cluster-grimmory.yaml | 25 ++++++ .../grimmory/HTTPRoute-grimmory.yaml | 30 +++++++ .../MariaDB-grimmory-mariadb-cluster.yaml | 36 ++++++++ .../grimmory/Namespace-grimmory.yaml | 13 +++ ...ume-grimmory-books-import-nfs-storage.yaml | 23 +++++ ...tentVolume-grimmory-books-nfs-storage.yaml | 23 +++++ ...aim-grimmory-books-import-nfs-storage.yaml | 17 ++++ ...olumeClaim-grimmory-books-nfs-storage.yaml | 17 ++++ ...PersistentVolumeClaim-grimmory-config.yaml | 17 ++++ ...mmory-mariadb-cluster-backup-external.yaml | 36 ++++++++ ...rimmory-mariadb-cluster-backup-garage.yaml | 34 +++++++ ...rimmory-mariadb-cluster-backup-remote.yaml | 36 ++++++++ ...onDestination-grimmory-config-restore.yaml | 16 ++++ ...rimmory-config-backup-source-external.yaml | 34 +++++++ ...e-grimmory-config-backup-source-local.yaml | 34 +++++++ ...-grimmory-config-backup-source-remote.yaml | 34 +++++++ .../manifests/grimmory/Service-grimmory.yaml | 22 +++++ ...ser-grimmory-mariadb-cluster-grimmory.yaml | 23 +++++ .../homepage/ConfigMap-homepage.yaml | 4 +- .../homepage/Deployment-homepage.yaml | 2 +- 35 files changed, 905 insertions(+), 5 deletions(-) create mode 100644 clusters/cl01tl/manifests/grimmory/Database-grimmory-mariadb-cluster-booklore.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/Deployment-grimmory.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/ExternalSecret-booklore-config-backup-secret-local.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-config-backup-secret-external.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-config-backup-secret-local.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-config-backup-secret-remote.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-data-replication-secret.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-database-secret.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-mariadb-cluster-backup-secret-external.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-mariadb-cluster-backup-secret-garage.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/Grant-grimmory-mariadb-cluster-grimmory.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/HTTPRoute-grimmory.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/MariaDB-grimmory-mariadb-cluster.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/Namespace-grimmory.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/PersistentVolume-grimmory-books-import-nfs-storage.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/PersistentVolume-grimmory-books-nfs-storage.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/PersistentVolumeClaim-grimmory-books-import-nfs-storage.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/PersistentVolumeClaim-grimmory-books-nfs-storage.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/PersistentVolumeClaim-grimmory-config.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/PhysicalBackup-grimmory-mariadb-cluster-backup-external.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/PhysicalBackup-grimmory-mariadb-cluster-backup-garage.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/PhysicalBackup-grimmory-mariadb-cluster-backup-remote.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/ReplicationDestination-grimmory-config-restore.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/ReplicationSource-grimmory-config-backup-source-external.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/ReplicationSource-grimmory-config-backup-source-local.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/ReplicationSource-grimmory-config-backup-source-remote.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/Service-grimmory.yaml create mode 100644 clusters/cl01tl/manifests/grimmory/User-grimmory-mariadb-cluster-grimmory.yaml diff --git a/clusters/cl01tl/manifests/audiobookshelf/Deployment-audiobookshelf.yaml b/clusters/cl01tl/manifests/audiobookshelf/Deployment-audiobookshelf.yaml index 11806e3fe..3156056f2 100644 --- a/clusters/cl01tl/manifests/audiobookshelf/Deployment-audiobookshelf.yaml +++ b/clusters/cl01tl/manifests/audiobookshelf/Deployment-audiobookshelf.yaml @@ -29,6 +29,9 @@ spec: enableServiceLinks: false serviceAccountName: default automountServiceAccountToken: true + securityContext: + fsGroup: 1000 + fsGroupChangePolicy: OnRootMismatch hostIPC: false hostNetwork: false hostPID: false diff --git a/clusters/cl01tl/manifests/blocky/ConfigMap-blocky.yaml b/clusters/cl01tl/manifests/blocky/ConfigMap-blocky.yaml index 508db5545..8f26dfe60 100644 --- a/clusters/cl01tl/manifests/blocky/ConfigMap-blocky.yaml +++ b/clusters/cl01tl/manifests/blocky/ConfigMap-blocky.yaml @@ -110,6 +110,7 @@ data: gatus IN CNAME traefik-cl01tl gitea IN CNAME traefik-cl01tl grafana IN CNAME traefik-cl01tl + grimmory IN CNAME traefik-cl01tl harbor IN CNAME traefik-cl01tl headlamp IN CNAME traefik-cl01tl home IN CNAME traefik-cl01tl diff --git a/clusters/cl01tl/manifests/blocky/Deployment-blocky.yaml b/clusters/cl01tl/manifests/blocky/Deployment-blocky.yaml index 1a3efe0e9..5762bfae5 100644 --- a/clusters/cl01tl/manifests/blocky/Deployment-blocky.yaml +++ b/clusters/cl01tl/manifests/blocky/Deployment-blocky.yaml @@ -22,7 +22,7 @@ spec: template: metadata: annotations: - checksum/configMaps: ffc0c3d2a76601cf367d0e28bf34cd3160ea1a1fa8486079607d34a5dc4c7b95 + checksum/configMaps: 8d57d80015b54c8d127b934de40319dcb46be8240567f57719eaa48e651bd60f labels: app.kubernetes.io/controller: main app.kubernetes.io/instance: blocky diff --git a/clusters/cl01tl/manifests/gatus/ConfigMap-gatus.yaml b/clusters/cl01tl/manifests/gatus/ConfigMap-gatus.yaml index d497c6ec7..bfde12105 100644 --- a/clusters/cl01tl/manifests/gatus/ConfigMap-gatus.yaml +++ b/clusters/cl01tl/manifests/gatus/ConfigMap-gatus.yaml @@ -150,6 +150,15 @@ data: interval: 30s name: booklore url: https://booklore.alexlebens.net + - alerts: + - type: ntfy + conditions: + - '[STATUS] == 200' + - '[CERTIFICATE_EXPIRATION] > 240h' + group: core + interval: 30s + name: grimmory + url: https://grimmory.alexlebens.net - alerts: - type: ntfy conditions: diff --git a/clusters/cl01tl/manifests/gatus/Deployment-gatus.yaml b/clusters/cl01tl/manifests/gatus/Deployment-gatus.yaml index 76af60dc2..abf6e95f7 100644 --- a/clusters/cl01tl/manifests/gatus/Deployment-gatus.yaml +++ b/clusters/cl01tl/manifests/gatus/Deployment-gatus.yaml @@ -26,7 +26,7 @@ spec: app.kubernetes.io/name: gatus app.kubernetes.io/instance: gatus annotations: - checksum/config: 3db1d1c04e342aab710658ef4d5a0607423bd0eaea864e4585bd03f4a1ee7f0c + checksum/config: feea2f61cb6f74cc1cf084587836e3d3dcd747d0b2f633996f6b184523359f62 spec: serviceAccountName: default automountServiceAccountToken: false diff --git a/clusters/cl01tl/manifests/grimmory/Database-grimmory-mariadb-cluster-booklore.yaml b/clusters/cl01tl/manifests/grimmory/Database-grimmory-mariadb-cluster-booklore.yaml new file mode 100644 index 000000000..b9d16d0b8 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/Database-grimmory-mariadb-cluster-booklore.yaml @@ -0,0 +1,20 @@ +apiVersion: k8s.mariadb.com/v1alpha1 +kind: Database +metadata: + name: grimmory-mariadb-cluster-booklore + namespace: grimmory + labels: + helm.sh/chart: mariadb-cluster-26.3.0 + app.kubernetes.io/name: mariadb-cluster + app.kubernetes.io/instance: grimmory + app.kubernetes.io/version: "0.0.0" + app.kubernetes.io/managed-by: Helm +spec: + mariaDbRef: + name: grimmory-mariadb-cluster + namespace: grimmory + characterSet: utf8 + cleanupPolicy: Delete + collate: utf8_general_ci + name: booklore + requeueInterval: 10h diff --git a/clusters/cl01tl/manifests/grimmory/Deployment-grimmory.yaml b/clusters/cl01tl/manifests/grimmory/Deployment-grimmory.yaml new file mode 100644 index 000000000..62949faa9 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/Deployment-grimmory.yaml @@ -0,0 +1,88 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: grimmory + labels: + app.kubernetes.io/controller: main + app.kubernetes.io/instance: grimmory + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: grimmory + helm.sh/chart: grimmory-4.6.2 + namespace: grimmory +spec: + revisionHistoryLimit: 3 + replicas: 0 + strategy: + type: Recreate + selector: + matchLabels: + app.kubernetes.io/controller: main + app.kubernetes.io/name: grimmory + app.kubernetes.io/instance: grimmory + template: + metadata: + labels: + app.kubernetes.io/controller: main + app.kubernetes.io/instance: grimmory + app.kubernetes.io/name: grimmory + spec: + enableServiceLinks: false + serviceAccountName: default + automountServiceAccountToken: true + securityContext: + fsGroup: 1000 + fsGroupChangePolicy: OnRootMismatch + runAsGroup: 1000 + runAsUser: 1000 + hostIPC: false + hostNetwork: false + hostPID: false + dnsPolicy: ClusterFirst + containers: + - env: + - name: TZ + value: America/Chicago + - name: USER_ID + value: "1000" + - name: GROUP_ID + value: "1000" + - name: DATABASE_URL + value: jdbc:mariadb://grimmory-mariadb-cluster-primary.grimmory:3306/booklore + - name: DATABASE_USERNAME + value: grimmory + - name: DATABASE_PASSWORD + valueFrom: + secretKeyRef: + key: password + name: grimmory-database-secret + - name: GRIMMORY_PORT + value: "6060" + - name: SWAGGER_ENABLED + value: "false" + image: ghcr.io/grimmory-tools/grimmory:v2.3.0@sha256:9014247f591074529894f81115ca40f899db697e89f72c2fe91ec530e3f19597 + name: main + resources: + requests: + cpu: 10m + memory: 1Gi + volumeMounts: + - mountPath: /bookdrop + name: books-import + - mountPath: /app/data + name: config + - mountPath: /data + name: data + - mountPath: /bookdrop/ingest + name: ingest + volumes: + - emptyDir: {} + name: books-import + - name: config + persistentVolumeClaim: + claimName: grimmory-config + - name: data + persistentVolumeClaim: + claimName: grimmory-books-nfs-storage + - name: ingest + persistentVolumeClaim: + claimName: grimmory-books-import-nfs-storage diff --git a/clusters/cl01tl/manifests/grimmory/ExternalSecret-booklore-config-backup-secret-local.yaml b/clusters/cl01tl/manifests/grimmory/ExternalSecret-booklore-config-backup-secret-local.yaml new file mode 100644 index 000000000..f0a39aa85 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/ExternalSecret-booklore-config-backup-secret-local.yaml @@ -0,0 +1,55 @@ +apiVersion: external-secrets.io/v1 +kind: ExternalSecret +metadata: + name: booklore-config-backup-secret-local + namespace: grimmory + labels: + app.kubernetes.io/name: booklore-config-backup-secret-local + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory +spec: + secretStoreRef: + kind: ClusterSecretStore + name: vault + target: + template: + engineVersion: v2 + mergePolicy: Merge + data: + RESTIC_REPOSITORY: '/booklore/booklore-config' + data: + - remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /volsync/restic/garage-local + metadataPolicy: None + property: BUCKET_ENDPOINT + secretKey: BUCKET_ENDPOINT + - remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /volsync/restic/garage-local + metadataPolicy: None + property: RESTIC_PASSWORD + secretKey: RESTIC_PASSWORD + - remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /garage/home-infra/volsync-backups + metadataPolicy: None + property: ACCESS_REGION + secretKey: AWS_DEFAULT_REGION + - remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /garage/home-infra/volsync-backups + metadataPolicy: None + property: ACCESS_KEY_ID + secretKey: AWS_ACCESS_KEY_ID + - remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /garage/home-infra/volsync-backups + metadataPolicy: None + property: ACCESS_SECRET_KEY + secretKey: AWS_SECRET_ACCESS_KEY diff --git a/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-config-backup-secret-external.yaml b/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-config-backup-secret-external.yaml new file mode 100644 index 000000000..c80244bfc --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-config-backup-secret-external.yaml @@ -0,0 +1,58 @@ +apiVersion: external-secrets.io/v1 +kind: ExternalSecret +metadata: + name: grimmory-config-backup-secret-external + namespace: grimmory + labels: + helm.sh/chart: volsync-target-config-0.8.0 + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory + app.kubernetes.io/version: "0.8.0" + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: grimmory-config-backup-secret-external +spec: + secretStoreRef: + kind: ClusterSecretStore + name: vault + target: + template: + mergePolicy: Merge + engineVersion: v2 + data: + RESTIC_REPOSITORY: "{{ .BUCKET_ENDPOINT }}/grimmory/grimmory-config" + data: + - secretKey: BUCKET_ENDPOINT + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /volsync/restic/digital-ocean + metadataPolicy: None + property: BUCKET_ENDPOINT + - secretKey: RESTIC_PASSWORD + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /volsync/restic/digital-ocean + metadataPolicy: None + property: RESTIC_PASSWORD + - secretKey: AWS_DEFAULT_REGION + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /digital-ocean/home-infra/volsync-backups + metadataPolicy: None + property: AWS_DEFAULT_REGION + - secretKey: AWS_ACCESS_KEY_ID + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /digital-ocean/home-infra/volsync-backups + metadataPolicy: None + property: AWS_ACCESS_KEY_ID + - secretKey: AWS_SECRET_ACCESS_KEY + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /digital-ocean/home-infra/volsync-backups + metadataPolicy: None + property: AWS_SECRET_ACCESS_KEY diff --git a/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-config-backup-secret-local.yaml b/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-config-backup-secret-local.yaml new file mode 100644 index 000000000..1527792f3 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-config-backup-secret-local.yaml @@ -0,0 +1,58 @@ +apiVersion: external-secrets.io/v1 +kind: ExternalSecret +metadata: + name: grimmory-config-backup-secret-local + namespace: grimmory + labels: + helm.sh/chart: volsync-target-config-0.8.0 + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory + app.kubernetes.io/version: "0.8.0" + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: grimmory-config-backup-secret-local +spec: + secretStoreRef: + kind: ClusterSecretStore + name: vault + target: + template: + mergePolicy: Merge + engineVersion: v2 + data: + RESTIC_REPOSITORY: "{{ .BUCKET_ENDPOINT }}/grimmory/grimmory-config" + data: + - secretKey: BUCKET_ENDPOINT + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /volsync/restic/garage-local + metadataPolicy: None + property: BUCKET_ENDPOINT + - secretKey: RESTIC_PASSWORD + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /volsync/restic/garage-local + metadataPolicy: None + property: RESTIC_PASSWORD + - secretKey: AWS_DEFAULT_REGION + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /garage/home-infra/volsync-backups + metadataPolicy: None + property: ACCESS_REGION + - secretKey: AWS_ACCESS_KEY_ID + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /garage/home-infra/volsync-backups + metadataPolicy: None + property: ACCESS_KEY_ID + - secretKey: AWS_SECRET_ACCESS_KEY + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /garage/home-infra/volsync-backups + metadataPolicy: None + property: ACCESS_SECRET_KEY diff --git a/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-config-backup-secret-remote.yaml b/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-config-backup-secret-remote.yaml new file mode 100644 index 000000000..c0abf2367 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-config-backup-secret-remote.yaml @@ -0,0 +1,58 @@ +apiVersion: external-secrets.io/v1 +kind: ExternalSecret +metadata: + name: grimmory-config-backup-secret-remote + namespace: grimmory + labels: + helm.sh/chart: volsync-target-config-0.8.0 + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory + app.kubernetes.io/version: "0.8.0" + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: grimmory-config-backup-secret-remote +spec: + secretStoreRef: + kind: ClusterSecretStore + name: vault + target: + template: + mergePolicy: Merge + engineVersion: v2 + data: + RESTIC_REPOSITORY: "{{ .BUCKET_ENDPOINT }}/grimmory/grimmory-config" + data: + - secretKey: BUCKET_ENDPOINT + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /volsync/restic/garage-remote + metadataPolicy: None + property: BUCKET_ENDPOINT + - secretKey: RESTIC_PASSWORD + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /volsync/restic/garage-remote + metadataPolicy: None + property: RESTIC_PASSWORD + - secretKey: AWS_DEFAULT_REGION + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /garage/home-infra/volsync-backups + metadataPolicy: None + property: ACCESS_REGION + - secretKey: AWS_ACCESS_KEY_ID + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /garage/home-infra/volsync-backups + metadataPolicy: None + property: ACCESS_KEY_ID + - secretKey: AWS_SECRET_ACCESS_KEY + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /garage/home-infra/volsync-backups + metadataPolicy: None + property: ACCESS_SECRET_KEY diff --git a/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-data-replication-secret.yaml b/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-data-replication-secret.yaml new file mode 100644 index 000000000..68d332cce --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-data-replication-secret.yaml @@ -0,0 +1,18 @@ +apiVersion: external-secrets.io/v1 +kind: ExternalSecret +metadata: + name: grimmory-data-replication-secret + namespace: grimmory + labels: + app.kubernetes.io/name: grimmory-data-replication-secret + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory +spec: + secretStoreRef: + kind: ClusterSecretStore + name: vault + data: + - secretKey: psk.txt + remoteRef: + key: /cl01tl/grimmory/replication + property: psk.txt diff --git a/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-database-secret.yaml b/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-database-secret.yaml new file mode 100644 index 000000000..bca49dfc2 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-database-secret.yaml @@ -0,0 +1,18 @@ +apiVersion: external-secrets.io/v1 +kind: ExternalSecret +metadata: + name: grimmory-database-secret + namespace: grimmory + labels: + app.kubernetes.io/name: grimmory-database-secret + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory +spec: + secretStoreRef: + kind: ClusterSecretStore + name: vault + data: + - secretKey: password + remoteRef: + key: /cl01tl/grimmory/database + property: password diff --git a/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-mariadb-cluster-backup-secret-external.yaml b/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-mariadb-cluster-backup-secret-external.yaml new file mode 100644 index 000000000..8cfb3102c --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-mariadb-cluster-backup-secret-external.yaml @@ -0,0 +1,22 @@ +apiVersion: external-secrets.io/v1 +kind: ExternalSecret +metadata: + name: grimmory-mariadb-cluster-backup-secret-external + namespace: grimmory + labels: + app.kubernetes.io/name: grimmory-mariadb-cluster-backup-secret-external + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory +spec: + secretStoreRef: + kind: ClusterSecretStore + name: vault + data: + - secretKey: access + remoteRef: + key: /digital-ocean/home-infra/mariadb-backups + property: access + - secretKey: secret + remoteRef: + key: /digital-ocean/home-infra/mariadb-backups + property: secret diff --git a/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-mariadb-cluster-backup-secret-garage.yaml b/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-mariadb-cluster-backup-secret-garage.yaml new file mode 100644 index 000000000..7c3124f76 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/ExternalSecret-grimmory-mariadb-cluster-backup-secret-garage.yaml @@ -0,0 +1,22 @@ +apiVersion: external-secrets.io/v1 +kind: ExternalSecret +metadata: + name: grimmory-mariadb-cluster-backup-secret-garage + namespace: grimmory + labels: + app.kubernetes.io/name: grimmory-mariadb-cluster-backup-secret-garage + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory +spec: + secretStoreRef: + kind: ClusterSecretStore + name: vault + data: + - secretKey: access + remoteRef: + key: /garage/home-infra/mariadb-backups + property: access + - secretKey: secret + remoteRef: + key: /garage/home-infra/mariadb-backups + property: secret diff --git a/clusters/cl01tl/manifests/grimmory/Grant-grimmory-mariadb-cluster-grimmory.yaml b/clusters/cl01tl/manifests/grimmory/Grant-grimmory-mariadb-cluster-grimmory.yaml new file mode 100644 index 000000000..a37d40d70 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/Grant-grimmory-mariadb-cluster-grimmory.yaml @@ -0,0 +1,25 @@ +apiVersion: k8s.mariadb.com/v1alpha1 +kind: Grant +metadata: + name: grimmory-mariadb-cluster-grimmory + namespace: grimmory + labels: + helm.sh/chart: mariadb-cluster-26.3.0 + app.kubernetes.io/name: mariadb-cluster + app.kubernetes.io/instance: grimmory + app.kubernetes.io/version: "0.0.0" + app.kubernetes.io/managed-by: Helm +spec: + mariaDbRef: + name: grimmory-mariadb-cluster + namespace: grimmory + cleanupPolicy: Delete + database: booklore + grantOption: true + host: '%' + privileges: + - ALL PRIVILEGES + requeueInterval: 10h + retryInterval: 30s + table: '*' + username: grimmory diff --git a/clusters/cl01tl/manifests/grimmory/HTTPRoute-grimmory.yaml b/clusters/cl01tl/manifests/grimmory/HTTPRoute-grimmory.yaml new file mode 100644 index 000000000..aaeb3ffe2 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/HTTPRoute-grimmory.yaml @@ -0,0 +1,30 @@ +apiVersion: gateway.networking.k8s.io/v1 +kind: HTTPRoute +metadata: + name: grimmory + labels: + app.kubernetes.io/instance: grimmory + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: grimmory + helm.sh/chart: grimmory-4.6.2 + namespace: grimmory +spec: + parentRefs: + - group: gateway.networking.k8s.io + kind: Gateway + name: traefik-gateway + namespace: traefik + hostnames: + - "grimmory.alexlebens.net" + rules: + - backendRefs: + - group: "" + kind: Service + name: grimmory + namespace: grimmory + port: 80 + weight: 1 + matches: + - path: + type: PathPrefix + value: / diff --git a/clusters/cl01tl/manifests/grimmory/MariaDB-grimmory-mariadb-cluster.yaml b/clusters/cl01tl/manifests/grimmory/MariaDB-grimmory-mariadb-cluster.yaml new file mode 100644 index 000000000..a1566f493 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/MariaDB-grimmory-mariadb-cluster.yaml @@ -0,0 +1,36 @@ +apiVersion: k8s.mariadb.com/v1alpha1 +kind: MariaDB +metadata: + name: grimmory-mariadb-cluster + namespace: grimmory + labels: + helm.sh/chart: mariadb-cluster-26.3.0 + app.kubernetes.io/name: mariadb-cluster + app.kubernetes.io/instance: grimmory + app.kubernetes.io/version: "0.0.0" + app.kubernetes.io/managed-by: Helm +spec: + bootstrapFrom: + backupContentType: Physical + s3: + accessKeyIdSecretKeyRef: + key: access + name: grimmory-mariadb-cluster-backup-secret-external + bucket: mariadb-backups-b230a2f5aecf080a4b372c08 + endpoint: nyc3.digitaloceanspaces.com + prefix: cl01tl/booklore + region: us-east-1 + secretAccessKeySecretKeyRef: + key: secret + name: grimmory-mariadb-cluster-backup-secret-external + tls: + enabled: true + galera: + enabled: true + replicas: 3 + rootPasswordSecretKeyRef: + generate: false + key: password + name: grimmory-database-secret + storage: + size: 5Gi diff --git a/clusters/cl01tl/manifests/grimmory/Namespace-grimmory.yaml b/clusters/cl01tl/manifests/grimmory/Namespace-grimmory.yaml new file mode 100644 index 000000000..9abba2a21 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/Namespace-grimmory.yaml @@ -0,0 +1,13 @@ +apiVersion: v1 +kind: Namespace +metadata: + name: grimmory + annotations: + volsync.backube/privileged-movers: "true" + labels: + app.kubernetes.io/name: grimmory + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory + pod-security.kubernetes.io/audit: privileged + pod-security.kubernetes.io/enforce: privileged + pod-security.kubernetes.io/warn: privileged diff --git a/clusters/cl01tl/manifests/grimmory/PersistentVolume-grimmory-books-import-nfs-storage.yaml b/clusters/cl01tl/manifests/grimmory/PersistentVolume-grimmory-books-import-nfs-storage.yaml new file mode 100644 index 000000000..258896ee1 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/PersistentVolume-grimmory-books-import-nfs-storage.yaml @@ -0,0 +1,23 @@ +apiVersion: v1 +kind: PersistentVolume +metadata: + name: grimmory-books-import-nfs-storage + namespace: grimmory + labels: + app.kubernetes.io/name: grimmory-books-import-nfs-storage + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory +spec: + persistentVolumeReclaimPolicy: Retain + storageClassName: nfs-client + capacity: + storage: 1Gi + accessModes: + - ReadWriteMany + nfs: + path: /volume2/Storage/Books Import + server: synologybond.alexlebens.net + mountOptions: + - vers=4 + - minorversion=1 + - noac diff --git a/clusters/cl01tl/manifests/grimmory/PersistentVolume-grimmory-books-nfs-storage.yaml b/clusters/cl01tl/manifests/grimmory/PersistentVolume-grimmory-books-nfs-storage.yaml new file mode 100644 index 000000000..774172e4e --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/PersistentVolume-grimmory-books-nfs-storage.yaml @@ -0,0 +1,23 @@ +apiVersion: v1 +kind: PersistentVolume +metadata: + name: grimmory-books-nfs-storage + namespace: grimmory + labels: + app.kubernetes.io/name: grimmory-books-nfs-storage + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory +spec: + persistentVolumeReclaimPolicy: Retain + storageClassName: nfs-client + capacity: + storage: 1Gi + accessModes: + - ReadWriteMany + nfs: + path: /volume2/Storage/Books + server: synologybond.alexlebens.net + mountOptions: + - vers=4 + - minorversion=1 + - noac diff --git a/clusters/cl01tl/manifests/grimmory/PersistentVolumeClaim-grimmory-books-import-nfs-storage.yaml b/clusters/cl01tl/manifests/grimmory/PersistentVolumeClaim-grimmory-books-import-nfs-storage.yaml new file mode 100644 index 000000000..18d7a3a8c --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/PersistentVolumeClaim-grimmory-books-import-nfs-storage.yaml @@ -0,0 +1,17 @@ +apiVersion: v1 +kind: PersistentVolumeClaim +metadata: + name: grimmory-books-import-nfs-storage + namespace: grimmory + labels: + app.kubernetes.io/name: grimmory-books-import-nfs-storage + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory +spec: + volumeName: grimmory-books-import-nfs-storage + storageClassName: nfs-client + accessModes: + - ReadWriteMany + resources: + requests: + storage: 1Gi diff --git a/clusters/cl01tl/manifests/grimmory/PersistentVolumeClaim-grimmory-books-nfs-storage.yaml b/clusters/cl01tl/manifests/grimmory/PersistentVolumeClaim-grimmory-books-nfs-storage.yaml new file mode 100644 index 000000000..5e9668b44 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/PersistentVolumeClaim-grimmory-books-nfs-storage.yaml @@ -0,0 +1,17 @@ +apiVersion: v1 +kind: PersistentVolumeClaim +metadata: + name: grimmory-books-nfs-storage + namespace: grimmory + labels: + app.kubernetes.io/name: grimmory-books-nfs-storage + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory +spec: + volumeName: grimmory-books-nfs-storage + storageClassName: nfs-client + accessModes: + - ReadWriteMany + resources: + requests: + storage: 1Gi diff --git a/clusters/cl01tl/manifests/grimmory/PersistentVolumeClaim-grimmory-config.yaml b/clusters/cl01tl/manifests/grimmory/PersistentVolumeClaim-grimmory-config.yaml new file mode 100644 index 000000000..e9cae016e --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/PersistentVolumeClaim-grimmory-config.yaml @@ -0,0 +1,17 @@ +kind: PersistentVolumeClaim +apiVersion: v1 +metadata: + name: grimmory-config + labels: + app.kubernetes.io/instance: grimmory + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: grimmory + helm.sh/chart: grimmory-4.6.2 + namespace: grimmory +spec: + accessModes: + - "ReadWriteOnce" + resources: + requests: + storage: "5Gi" + storageClassName: "ceph-block" diff --git a/clusters/cl01tl/manifests/grimmory/PhysicalBackup-grimmory-mariadb-cluster-backup-external.yaml b/clusters/cl01tl/manifests/grimmory/PhysicalBackup-grimmory-mariadb-cluster-backup-external.yaml new file mode 100644 index 000000000..170ad852a --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/PhysicalBackup-grimmory-mariadb-cluster-backup-external.yaml @@ -0,0 +1,36 @@ +apiVersion: k8s.mariadb.com/v1alpha1 +kind: PhysicalBackup +metadata: + name: grimmory-mariadb-cluster-backup-external + namespace: grimmory + labels: + helm.sh/chart: mariadb-cluster-26.3.0 + app.kubernetes.io/name: mariadb-cluster + app.kubernetes.io/instance: grimmory + app.kubernetes.io/version: "0.0.0" + app.kubernetes.io/managed-by: Helm +spec: + mariaDbRef: + name: grimmory-mariadb-cluster + namespace: grimmory + compression: gzip + maxRetention: 2160h + schedule: + cron: 0 0 * * 0 + immediate: true + suspend: false + storage: + s3: + accessKeyIdSecretKeyRef: + key: access + name: grimmory-mariadb-cluster-backup-secret-external + bucket: mariadb-backups-b230a2f5aecf080a4b372c08 + endpoint: nyc3.digitaloceanspaces.com + prefix: cl01tl/grimmory + region: us-east-1 + secretAccessKeySecretKeyRef: + key: secret + name: grimmory-mariadb-cluster-backup-secret-external + tls: + enabled: true + successfulJobsHistoryLimit: 1 diff --git a/clusters/cl01tl/manifests/grimmory/PhysicalBackup-grimmory-mariadb-cluster-backup-garage.yaml b/clusters/cl01tl/manifests/grimmory/PhysicalBackup-grimmory-mariadb-cluster-backup-garage.yaml new file mode 100644 index 000000000..15c16f745 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/PhysicalBackup-grimmory-mariadb-cluster-backup-garage.yaml @@ -0,0 +1,34 @@ +apiVersion: k8s.mariadb.com/v1alpha1 +kind: PhysicalBackup +metadata: + name: grimmory-mariadb-cluster-backup-garage + namespace: grimmory + labels: + helm.sh/chart: mariadb-cluster-26.3.0 + app.kubernetes.io/name: mariadb-cluster + app.kubernetes.io/instance: grimmory + app.kubernetes.io/version: "0.0.0" + app.kubernetes.io/managed-by: Helm +spec: + mariaDbRef: + name: grimmory-mariadb-cluster + namespace: grimmory + compression: gzip + maxRetention: 360h + schedule: + cron: 0 0 * * * + immediate: true + suspend: false + storage: + s3: + accessKeyIdSecretKeyRef: + key: access + name: grimmory-mariadb-cluster-backup-secret-garage + bucket: mariadb-backups + endpoint: garage-main.garage:3900 + prefix: cl01tl/grimmory + region: us-east-1 + secretAccessKeySecretKeyRef: + key: secret + name: grimmory-mariadb-cluster-backup-secret-garage + successfulJobsHistoryLimit: 1 diff --git a/clusters/cl01tl/manifests/grimmory/PhysicalBackup-grimmory-mariadb-cluster-backup-remote.yaml b/clusters/cl01tl/manifests/grimmory/PhysicalBackup-grimmory-mariadb-cluster-backup-remote.yaml new file mode 100644 index 000000000..8f188f9c9 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/PhysicalBackup-grimmory-mariadb-cluster-backup-remote.yaml @@ -0,0 +1,36 @@ +apiVersion: k8s.mariadb.com/v1alpha1 +kind: PhysicalBackup +metadata: + name: grimmory-mariadb-cluster-backup-remote + namespace: grimmory + labels: + helm.sh/chart: mariadb-cluster-26.3.0 + app.kubernetes.io/name: mariadb-cluster + app.kubernetes.io/instance: grimmory + app.kubernetes.io/version: "0.0.0" + app.kubernetes.io/managed-by: Helm +spec: + mariaDbRef: + name: grimmory-mariadb-cluster + namespace: grimmory + compression: gzip + maxRetention: 2160h + schedule: + cron: 0 0 * * 0 + immediate: true + suspend: false + storage: + s3: + accessKeyIdSecretKeyRef: + key: access + name: grimmory-mariadb-cluster-backup-secret-garage + bucket: mariadb-backups + endpoint: garage-ps10rp.boreal-beaufort.ts.net:3900 + prefix: cl01tl/grimmory + region: us-east-1 + secretAccessKeySecretKeyRef: + key: secret + name: grimmory-mariadb-cluster-backup-secret-garage + tls: + enabled: true + successfulJobsHistoryLimit: 1 diff --git a/clusters/cl01tl/manifests/grimmory/ReplicationDestination-grimmory-config-restore.yaml b/clusters/cl01tl/manifests/grimmory/ReplicationDestination-grimmory-config-restore.yaml new file mode 100644 index 000000000..c2dedddb5 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/ReplicationDestination-grimmory-config-restore.yaml @@ -0,0 +1,16 @@ +apiVersion: volsync.backube/v1alpha1 +kind: ReplicationDestination +metadata: + name: grimmory-config-restore + namespace: grimmory + labels: + app.kubernetes.io/name: grimmory-config-restore + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory +spec: + trigger: + manual: restore-once + restic: + repository: booklore-config-backup-secret-local + destinationPVC: grimmory-config + copyMethod: Direct diff --git a/clusters/cl01tl/manifests/grimmory/ReplicationSource-grimmory-config-backup-source-external.yaml b/clusters/cl01tl/manifests/grimmory/ReplicationSource-grimmory-config-backup-source-external.yaml new file mode 100644 index 000000000..35a3b9425 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/ReplicationSource-grimmory-config-backup-source-external.yaml @@ -0,0 +1,34 @@ +apiVersion: volsync.backube/v1alpha1 +kind: ReplicationSource +metadata: + name: grimmory-config-backup-source-external + namespace: grimmory + labels: + helm.sh/chart: volsync-target-config-0.8.0 + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory + app.kubernetes.io/version: "0.8.0" + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: grimmory-config-backup +spec: + sourcePVC: grimmory-config + trigger: + schedule: 12 10 * * * + restic: + pruneIntervalDays: 7 + repository: grimmory-config-backup-secret-external + retain: + daily: 7 + hourly: 0 + monthly: 3 + weekly: 4 + yearly: 1 + moverSecurityContext: + fsGroup: 1000 + fsGroupChangePolicy: OnRootMismatch + runAsGroup: 1000 + runAsUser: 1000 + copyMethod: Snapshot + storageClassName: ceph-block + volumeSnapshotClassName: ceph-blockpool-snapshot + cacheCapacity: 1Gi diff --git a/clusters/cl01tl/manifests/grimmory/ReplicationSource-grimmory-config-backup-source-local.yaml b/clusters/cl01tl/manifests/grimmory/ReplicationSource-grimmory-config-backup-source-local.yaml new file mode 100644 index 000000000..4581022b3 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/ReplicationSource-grimmory-config-backup-source-local.yaml @@ -0,0 +1,34 @@ +apiVersion: volsync.backube/v1alpha1 +kind: ReplicationSource +metadata: + name: grimmory-config-backup-source-local + namespace: grimmory + labels: + helm.sh/chart: volsync-target-config-0.8.0 + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory + app.kubernetes.io/version: "0.8.0" + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: grimmory-config-backup +spec: + sourcePVC: grimmory-config + trigger: + schedule: 12 8 * * * + restic: + pruneIntervalDays: 7 + repository: grimmory-config-backup-secret-local + retain: + daily: 7 + hourly: 0 + monthly: 3 + weekly: 4 + yearly: 1 + moverSecurityContext: + fsGroup: 1000 + fsGroupChangePolicy: OnRootMismatch + runAsGroup: 1000 + runAsUser: 1000 + copyMethod: Snapshot + storageClassName: ceph-block + volumeSnapshotClassName: ceph-blockpool-snapshot + cacheCapacity: 1Gi diff --git a/clusters/cl01tl/manifests/grimmory/ReplicationSource-grimmory-config-backup-source-remote.yaml b/clusters/cl01tl/manifests/grimmory/ReplicationSource-grimmory-config-backup-source-remote.yaml new file mode 100644 index 000000000..f1f7dc610 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/ReplicationSource-grimmory-config-backup-source-remote.yaml @@ -0,0 +1,34 @@ +apiVersion: volsync.backube/v1alpha1 +kind: ReplicationSource +metadata: + name: grimmory-config-backup-source-remote + namespace: grimmory + labels: + helm.sh/chart: volsync-target-config-0.8.0 + app.kubernetes.io/instance: grimmory + app.kubernetes.io/part-of: grimmory + app.kubernetes.io/version: "0.8.0" + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: grimmory-config-backup +spec: + sourcePVC: grimmory-config + trigger: + schedule: 12 9 * * * + restic: + pruneIntervalDays: 7 + repository: grimmory-config-backup-secret-remote + retain: + daily: 7 + hourly: 0 + monthly: 3 + weekly: 4 + yearly: 1 + moverSecurityContext: + fsGroup: 1000 + fsGroupChangePolicy: OnRootMismatch + runAsGroup: 1000 + runAsUser: 1000 + copyMethod: Snapshot + storageClassName: ceph-block + volumeSnapshotClassName: ceph-blockpool-snapshot + cacheCapacity: 1Gi diff --git a/clusters/cl01tl/manifests/grimmory/Service-grimmory.yaml b/clusters/cl01tl/manifests/grimmory/Service-grimmory.yaml new file mode 100644 index 000000000..d96eaa46b --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/Service-grimmory.yaml @@ -0,0 +1,22 @@ +apiVersion: v1 +kind: Service +metadata: + name: grimmory + labels: + app.kubernetes.io/instance: grimmory + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/name: grimmory + app.kubernetes.io/service: grimmory + helm.sh/chart: grimmory-4.6.2 + namespace: grimmory +spec: + type: ClusterIP + ports: + - port: 80 + targetPort: 6060 + protocol: TCP + name: http + selector: + app.kubernetes.io/controller: main + app.kubernetes.io/instance: grimmory + app.kubernetes.io/name: grimmory diff --git a/clusters/cl01tl/manifests/grimmory/User-grimmory-mariadb-cluster-grimmory.yaml b/clusters/cl01tl/manifests/grimmory/User-grimmory-mariadb-cluster-grimmory.yaml new file mode 100644 index 000000000..1662155b5 --- /dev/null +++ b/clusters/cl01tl/manifests/grimmory/User-grimmory-mariadb-cluster-grimmory.yaml @@ -0,0 +1,23 @@ +apiVersion: k8s.mariadb.com/v1alpha1 +kind: User +metadata: + name: grimmory-mariadb-cluster-grimmory + namespace: grimmory + labels: + helm.sh/chart: mariadb-cluster-26.3.0 + app.kubernetes.io/name: mariadb-cluster + app.kubernetes.io/instance: grimmory + app.kubernetes.io/version: "0.0.0" + app.kubernetes.io/managed-by: Helm +spec: + mariaDbRef: + name: grimmory-mariadb-cluster + namespace: grimmory + cleanupPolicy: Delete + host: '%' + name: grimmory + passwordSecretKeyRef: + key: password + name: grimmory-database-secret + requeueInterval: 10h + retryInterval: 30s diff --git a/clusters/cl01tl/manifests/homepage/ConfigMap-homepage.yaml b/clusters/cl01tl/manifests/homepage/ConfigMap-homepage.yaml index a1312141c..996e02e1f 100644 --- a/clusters/cl01tl/manifests/homepage/ConfigMap-homepage.yaml +++ b/clusters/cl01tl/manifests/homepage/ConfigMap-homepage.yaml @@ -140,8 +140,8 @@ data: - Books: icon: sh-booklore.webp description: Grimmory - href: https://booklore.alexlebens.net - siteMonitor: http://booklore.booklore:80 + href: https://grimmory.alexlebens.net + siteMonitor: http://grimmory.grimmory:80 statusStyle: dot - Public: - Site: diff --git a/clusters/cl01tl/manifests/homepage/Deployment-homepage.yaml b/clusters/cl01tl/manifests/homepage/Deployment-homepage.yaml index 315e2ed71..0348c646f 100644 --- a/clusters/cl01tl/manifests/homepage/Deployment-homepage.yaml +++ b/clusters/cl01tl/manifests/homepage/Deployment-homepage.yaml @@ -24,7 +24,7 @@ spec: template: metadata: annotations: - checksum/configMaps: 16089e4d54ef27894722f0317c3ed6dfd4530443b66f304b18bbd8a1a3703cb3 + checksum/configMaps: e0df070b5cef382f3b2b89a9d4c38a78e566098dfe00c6bbdcc49d4107ed6a1a checksum/secrets: d3ba83f111cd32f92c909268c55ad8bbd4f9e299b74b35b33c1a011180d8b378 labels: app.kubernetes.io/controller: main -- 2.49.1