slskd: controllers: main: type: deployment replicas: 1 strategy: Recreate revisionHistoryLimit: 3 initContainers: init-sysctl: image: repository: busybox tag: 1.37.0 pullPolicy: IfNotPresent securityContext: privileged: True resources: requests: cpu: 10m memory: 128Mi command: - /bin/sh args: - -ec - | sysctl -w net.ipv4.ip_forward=1; sysctl -w net.ipv6.conf.all.disable_ipv6=1 containers: main: image: repository: slskd/slskd tag: 0.24.1 pullPolicy: IfNotPresent env: - name: TZ value: US/Central - name: PUID value: 1000 - name: PGID value: 1000 - name: SLSKD_UMASK value: 000 resources: requests: cpu: 100m memory: 512Mi gluetun: image: repository: ghcr.io/qdm12/gluetun tag: v3.40.4@sha256:e10584de1f82d8999e5e6c3111901d9d56a2eed21151fb96af060f390bbdfba8 pullPolicy: IfNotPresent lifecycle: postStart: exec: command: ["/bin/sh", "-c", "(ip rule del table 51820; ip -6 rule del table 51820) || true"] env: - name: VPN_SERVICE_PROVIDER value: protonvpn - name: VPN_TYPE value: wireguard - name: WIREGUARD_PRIVATE_KEY valueFrom: secretKeyRef: name: slskd-wireguard-conf key: private-key - name: VPN_PORT_FORWARDING value: "on" - name: PORT_FORWARD_ONLY value: "on" - name: FIREWALL_OUTBOUND_SUBNETS value: 192.168.1.0/24,10.244.0.0/16 - name: FIREWALL_INPUT_PORTS value: 5030,50300 - name: DOT value: "off" securityContext: privileged: true capabilities: add: - NET_ADMIN - SYS_MODULE probes: liveness: enabled: true custom: true spec: exec: command: - /gluetun-entrypoint - healthcheck failureThreshold: 5 initialDelaySeconds: 30 periodSeconds: 30 successThreshold: 1 timeoutSeconds: 15 resources: limits: devic.es/tun: "1" requests: devic.es/tun: "1" cpu: 10m memory: 128Mi soularr: type: deployment replicas: 1 strategy: Recreate revisionHistoryLimit: 3 pod: securityContext: fsGroup: 1000 fsGroupChangePolicy: OnRootMismatch containers: main: image: repository: mrusse08/soularr tag: latest@sha256:b41d4f8ec74e9eded55e0096ddb40ba155ff3288f87b50639d57e5ba4c980159 pullPolicy: IfNotPresent env: - name: TZ value: US/Central - name: PUID value: 1000 - name: PGID value: 1000 - name: SCRIPT_INTERVAL value: 300 resources: requests: cpu: 10m memory: 256Mi service: main: controller: main ports: http: port: 5030 targetPort: 5030 protocol: HTTP serviceMonitor: main: selector: matchLabels: app.kubernetes.io/name: slskd app.kubernetes.io/instance: slskd serviceName: '{{ include "bjw-s.common.lib.chart.names.fullname" $ }}' endpoints: - port: http interval: 3m scrapeTimeout: 1m path: /metrics route: main: kind: HTTPRoute parentRefs: - group: gateway.networking.k8s.io kind: Gateway name: traefik-gateway namespace: traefik hostnames: - slskd.alexlebens.net rules: - backendRefs: - group: '' kind: Service name: slskd port: 5030 weight: 100 matches: - path: type: PathPrefix value: / persistence: slskd-config: enabled: true type: secret name: slskd-config-secret advancedMounts: main: main: - path: /app/slskd.yml readOnly: true mountPropagation: None subPath: slskd.yml soularr-config: enabled: true type: secret name: soularr-config-secret advancedMounts: soularr: main: - path: /data/config.ini readOnly: true mountPropagation: None subPath: config.ini data: existingClaim: slskd-nfs-storage advancedMounts: main: main: - path: /mnt/store readOnly: false soularr: main: - path: /mnt/store readOnly: false