Compare commits

..

19 Commits

Author SHA1 Message Date
9297ee3964 minecraft user nfs 2026-03-05 18:28:58 +00:00
0a0e3982e8 java edition 2026-03-05 18:16:18 +00:00
c0ac96265e correction pvc minecraft 2026-03-05 18:05:12 +00:00
71fe67c1e0 minecraft server port correction 2026-03-05 12:48:05 +00:00
8a49477449 minecraft added 2026-03-05 12:15:42 +00:00
46505df323 BOOKS 2026-02-08 18:14:11 +00:00
0294601e2c vaultwarden there is a bug in a version 2026-01-23 21:39:29 +00:00
1e827ede7b bitwarden passado 2026-01-23 20:30:04 +00:00
d8e54b6af4 mangareader 2026-01-23 20:11:16 +00:00
7f42b439c9 Merge branch 'main' of https://gitea.fenix-dev.com/fenix-gitea-admin/iac-ansible-private 2026-01-23 11:54:29 +00:00
67dc792660 deploy 2026-01-23 11:54:18 +00:00
128823f456 lazylibrarian, bookshelf, suwayomi (mangareader),, shelfarr
testes
2026-01-23 11:52:58 +00:00
9e703cf9fd anchorr 2026-01-21 16:51:47 +00:00
8ccda6978e logo no readme 2026-01-21 16:20:14 +00:00
f832f2ad37 upload logo
upload logo
2026-01-21 16:18:24 +00:00
f7c345e505 lingarr e libreTranslate 2026-01-05 20:57:50 +00:00
5460418ecb whipearr lingrrr, vai ser trocado agora por libretrasnlate 2026-01-05 15:18:13 +00:00
696c542b6b nvidia time slicing and bazzar 2026-01-04 14:24:53 +00:00
0fda7f84ba bazarr 2026-01-03 14:45:07 +00:00
71 changed files with 1870 additions and 5 deletions

View File

@ -13,3 +13,6 @@ flaresolverr comes from https://github.com/FlareSolverr/FlareSolverr
jellyseer comes from https://hub.docker.com/r/fallenbagel/jellyseerr
and https://docs.seerr.dev/extending-jellyseerr/database-config
decluttarr comes from https://github.com/ManiMatter/decluttarr
minecraft comes from https://www.civo.com/learn/deploying-minecraft-server-kubernetes
![logo](fenix-iac.png)

BIN
fenix-iac.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.0 MiB

View File

@ -33,3 +33,13 @@
- flaresolverr
- jellyseerr
- decluttarr
- bazarr
- libreTranslate
- lingarr
- cripto
- anchorr
- lazylibrarian
- mangareader
- bookshelf
- shelfarr
- minecraft

View File

@ -0,0 +1,46 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: anchorr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: anchorr
template:
metadata:
labels:
app: anchorr
spec:
imagePullSecrets:
- name: regcred
containers:
- name: anchorr
image: nairdah/anchorr:latest
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 8282
name: webhook
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
- name: NODE_ENV
value: 'production'
- name: WEBHOOK_PORT
value: '8282'
volumeMounts:
- name: config
mountPath: /usr/src/app/config
volumes:
- name: config
persistentVolumeClaim:
claimName: anchorr-config-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: anchorr-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/anchorr
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,29 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: anchorr-config-pv
namespace: stack-arr
spec:
capacity:
storage: 2Gi
storageClassName: anchorr-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/anchorr/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: anchorr-config-pvc
namespace: stack-arr
spec:
storageClassName: anchorr-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: anchorr-config-pv
resources:
requests:
storage: 2Gi

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: anchorr-service
namespace: stack-arr
spec:
ports:
- port: 8282
targetPort: 8282
selector:
app: anchorr
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/anchorr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/anchorr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/anchorr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/anchorr/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.anchorr.secret", dest: "/tmp/stack-arr/anchorr/kubernetes-files/files/anchorr-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/anchorr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/anchorr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,70 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: bazarr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: bazarr
template:
metadata:
labels:
app: bazarr
spec:
imagePullSecrets:
- name: regcred
containers:
- name: bazarr
image: lscr.io/linuxserver/bazarr:1.5.3
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 6767
name: webui
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
- name: POSTGRES_ENABLED
value: 'true'
- name: POSTGRES_HOST
value: 'stolon-proxy-service.postgresql.svc.cluster.local'
- name: POSTGRES_PORT
value: '5432'
- name: POSTGRES_USERNAME
valueFrom:
secretKeyRef:
name: bazarr-secret
key: username
- name: POSTGRES_PASSWORD
valueFrom:
secretKeyRef:
name: bazarr-secret
key: password
- name: POSTGRES_DATABASE
valueFrom:
secretKeyRef:
name: bazarr-secret
key: maindb
volumeMounts:
- name: config
mountPath: /config
- name: media
mountPath: /media
volumes:
- name: config
persistentVolumeClaim:
claimName: bazarr-config-pvc
- name: media
persistentVolumeClaim:
claimName: bazarr-media-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: bazarr-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/bazarr
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,60 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: bazarr-config-pv
namespace: stack-arr
spec:
capacity:
storage: 2Gi
storageClassName: bazarr-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/bazarr/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: bazarr-config-pvc
namespace: stack-arr
spec:
storageClassName: bazarr-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: bazarr-config-pv
resources:
requests:
storage: 2Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: bazarr-media-pv
namespace: stack-arr
spec:
capacity:
storage: 150Gi
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: bazarr-media-pvc
namespace: stack-arr
spec:
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: bazarr-media-pv
resources:
requests:
storage: 150Gi
---

View File

@ -0,0 +1,11 @@
apiVersion: v1
kind: Secret
metadata:
name: bazarr-secret
namespace: stack-arr
type: Opaque
data:
username: dXNlcm5hbWU=
password: cGFzc3dvcmQ=
maindb: bWFpbmRiLXByb3dsYXJy
logsdb: bG9nZGItcHJvd2xhcnI=

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: bazarr-service
namespace: stack-arr
spec:
ports:
- port: 6767
targetPort: 6767
selector:
app: bazarr
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/bazarr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/bazarr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/bazarr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/bazarr/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Obter várias notas do Bitwarden
shell: |
echo "unlock"
BW_SESSION=$(bw unlock {{ bw_password }} --raw)
echo "get item"
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.stackarr.bazarr.secret", dest: "/tmp/stack-arr/bazarr/kubernetes-files/files/bazarr-secret.yaml" }
args:
executable: /bin/bash
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/bazarr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/bazarr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,54 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: bookshelf
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: bookshelf
template:
metadata:
labels:
app: bookshelf
spec:
imagePullSecrets:
- name: regcred
containers:
- name: bookshelf
image: ghcr.io/pennydreadful/bookshelf:softcover-v0.4.20.91
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 8787
name: webui
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
volumeMounts:
- name: config
mountPath: /config
- name: books
mountPath: /books
- name: downloads
mountPath: /downloads
volumes:
- name: config
persistentVolumeClaim:
claimName: bookshelf-config-pvc
- name: books
persistentVolumeClaim:
claimName: bookshelf-books-pvc
- name: downloads
persistentVolumeClaim:
claimName: qbittorrent-downloads-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: bookshelf-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/bookshelf
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,60 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: bookshelf-config-pv
namespace: stack-arr
spec:
capacity:
storage: 20Gi
storageClassName: bookshelf-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/bookshelf/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: bookshelf-config-pvc
namespace: stack-arr
spec:
storageClassName: bookshelf-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: bookshelf-config-pv
resources:
requests:
storage: 20Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: bookshelf-media-pv
namespace: stack-arr
spec:
capacity:
storage: 150Gi
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series/Livros
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: bookshelf-books-pvc
namespace: stack-arr
spec:
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: bookshelf-media-pv
resources:
requests:
storage: 150Gi
---

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: bookshelf-service
namespace: stack-arr
spec:
ports:
- port: 8787
targetPort: 8787
selector:
app: bookshelf
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/bookshelf/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/bookshelf/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/bookshelf/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/bookshelf/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.bookshelf.secret", dest: "/tmp/stack-arr/bookshelf/kubernetes-files/files/bookshelf-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/bookshelf/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/bookshelf/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -17,7 +17,11 @@ spec:
- name: regcred
containers:
- name: jellyfin
image: lscr.io/linuxserver/jellyfin:10.11.2
image: lscr.io/linuxserver/jellyfin:10.11.5
resources:
limits:
memory: "9G" # Maximum memory allowed
cpu: "4" # Maximum CPU allowed
securityContext:
capabilities:
add:
@ -43,6 +47,8 @@ spec:
mountPath: /config
- name: videos
mountPath: /videos
- name: books
mountPath: /books
volumes:
- name: config
persistentVolumeClaim:
@ -50,6 +56,9 @@ spec:
- name: videos
persistentVolumeClaim:
claimName: jellyfin-videos-pvc
- name: books
persistentVolumeClaim:
claimName: jellyfin-books-pvc

View File

@ -61,3 +61,33 @@ spec:
requests:
storage: 150Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: jellyfin-books-pv
namespace: stack-arr
spec:
capacity:
storage: 150Gi
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series/Livros
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: jellyfin-books-pvc
namespace: stack-arr
spec:
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: jellyfin-books-pv
resources:
requests:
storage: 150Gi
---

View File

@ -0,0 +1,54 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: lazylibrarian
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: lazylibrarian
template:
metadata:
labels:
app: lazylibrarian
spec:
imagePullSecrets:
- name: regcred
containers:
- name: lazylibrarian
image: lscr.io/linuxserver/lazylibrarian:latest
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 5299
name: webui
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
volumeMounts:
- name: config
mountPath: /config
- name: books
mountPath: /books
- name: downloads
mountPath: /downloads
volumes:
- name: config
persistentVolumeClaim:
claimName: lazylibrarian-config-pvc
- name: books
persistentVolumeClaim:
claimName: lazylibrarian-books-pvc
- name: downloads
persistentVolumeClaim:
claimName: qbittorrent-downloads-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: lazylibrarian-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/lazylibrarian
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,60 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: lazylibrarian-config-pv
namespace: stack-arr
spec:
capacity:
storage: 20Gi
storageClassName: lazylibrarian-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/lazylibrarian/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: lazylibrarian-config-pvc
namespace: stack-arr
spec:
storageClassName: lazylibrarian-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: lazylibrarian-config-pv
resources:
requests:
storage: 20Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: lazylibrarian-media-pv
namespace: stack-arr
spec:
capacity:
storage: 150Gi
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series/Livros
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: lazylibrarian-books-pvc
namespace: stack-arr
spec:
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: lazylibrarian-media-pv
resources:
requests:
storage: 150Gi
---

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: lazylibrarian-service
namespace: stack-arr
spec:
ports:
- port: 5299
targetPort: 5299
selector:
app: lazylibrarian
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/lazylibrarian/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/lazylibrarian/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/lazylibrarian/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/lazylibrarian/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.lazylibrarian.secret", dest: "/tmp/stack-arr/lazylibrarian/kubernetes-files/files/lazylibrarian-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/lazylibrarian/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/lazylibrarian/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,26 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: libretranslate
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: libretranslate
template:
metadata:
labels:
app: libretranslate
spec:
containers:
- name: libretranslate
image: libretranslate/libretranslate:latest
ports:
- containerPort: 5000
env:
- name: LT_HTTP_HOST
value: "0.0.0.0"
- name: LT_HTTP_PORT
value: "5000"

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: libretranslate-service
namespace: stack-arr
spec:
ports:
- port: 5000
targetPort: 5000
selector:
app: libretranslate
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/libreTranslate/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/libreTranslate/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/libreTranslate/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/libreTranslate/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.radarr.secret", dest: "/tmp/stack-arr/radarr/kubernetes-files/files/radarr-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/libreTranslate/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/libreTranslate/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,36 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: lingarr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: lingarr
template:
metadata:
labels:
app: lingarr
spec:
containers:
- name: lingarr
image: lingarr/lingarr:latest
ports:
- containerPort: 9876
env:
- name: ASPNETCORE_URLS
value: "http://+:9876"
- name: WHISPER_BASE_URL
value: "http://whisperasr-service.stack-arr.svc.cluster.local:9000"
- name: SOURCE_LANGUAGE
value: "auto"
- name: TARGET_LANGUAGE
value: "pt"
volumeMounts:
- name: config
mountPath: /app/config
volumes:
- name: config
persistentVolumeClaim:
claimName: lingarr-config-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: lingarr-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/lingarr
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,29 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: lingarr-config-pv
namespace: stack-arr
spec:
capacity:
storage: 10Gi
storageClassName: lingarr-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/lingarr/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: lingarr-config-pvc
namespace: stack-arr
spec:
storageClassName: lingarr-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: lingarr-config-pv
resources:
requests:
storage: 10Gi

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: lingarr-service
namespace: stack-arr
spec:
ports:
- port: 9876
targetPort: 9876
selector:
app: lingarr
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/lingarr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/lingarr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/lingarr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/lingarr/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.radarr.secret", dest: "/tmp/stack-arr/radarr/kubernetes-files/files/radarr-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/lingarr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/lingarr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,90 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: mangareader
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: mangareader
template:
metadata:
labels:
app: mangareader
spec:
securityContext:
fsGroup: 1013
imagePullSecrets:
- name: regcred
containers:
- name: mangareader
image: ghcr.io/suwayomi/tachidesk:v2.1.2061
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 4567
name: webui
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
- name: AUTO_DOWNLOAD_CHAPTERS
value: 'true'
- name: AUTO_BACKUP_INCLUDE_MANGA
value: 'false'
- name: AUTO_BACKUP_INCLUDE_CATEGORIES
value: 'false'
- name: AUTO_BACKUP_INCLUDE_CHAPTERS
value: 'false'
- name: AUTO_BACKUP_INCLUDE_TRACKING
value: 'false'
- name: AUTO_BACKUP_INCLUDE_HISTORY
value: 'false'
- name: AUTO_BACKUP_INCLUDE_CLIENT_DATA
value: 'false'
- name: AUTO_BACKUP_INCLUDE_SERVER_SETTINGS
value: 'false'
- name: FLARESOLVERR_ENABLED
value: 'true'
- name: FLARESOLVERR_URL
value: 'http://flaresolverr-service.stack-arr.svc.cluster.local:8191'
- name: DATABASE_TYPE
value: 'POSTGRESQL'
- name: DATABASE_URL
value: 'postgresql://stolon-proxy-service.postgresql.svc.cluster.local:5432/mangareader'
- name: DATABASE_USERNAME
valueFrom:
secretKeyRef:
name: mangareader-secret
key: username
- name: DATABASE_PASSWORD
valueFrom:
secretKeyRef:
name: mangareader-secret
key: password
volumeMounts:
- name: config
mountPath: /home/suwayomi/.local/share/Tachidesk
- name: books
mountPath: /books
- name: downloads
mountPath: /downloads
volumes:
- name: config
persistentVolumeClaim:
claimName: mangareader-config-pvc
- name: books
persistentVolumeClaim:
claimName: mangareader-books-pvc
- name: downloads
persistentVolumeClaim:
claimName: qbittorrent-downloads-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: mangareader-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/mangareader
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,60 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: mangareader-config-pv
namespace: stack-arr
spec:
capacity:
storage: 20Gi
storageClassName: mangareader-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/mangareader/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: mangareader-config-pvc
namespace: stack-arr
spec:
storageClassName: mangareader-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: mangareader-config-pv
resources:
requests:
storage: 20Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: mangareader-media-pv
namespace: stack-arr
spec:
capacity:
storage: 150Gi
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series/Livros
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: mangareader-books-pvc
namespace: stack-arr
spec:
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: mangareader-media-pv
resources:
requests:
storage: 150Gi
---

View File

@ -0,0 +1,9 @@
apiVersion: v1
kind: Secret
metadata:
name: mangareader-secret
namespace: stack-arr
type: Opaque
data:
username: dXNlcm5hbWU=
password: cGFzc3dvcmQ=

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: mangareader-service
namespace: stack-arr
spec:
ports:
- port: 4567
targetPort: 4567
selector:
app: mangareader
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/mangareader/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/mangareader/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/mangareader/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/mangareader/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Obter várias notas do Bitwarden
shell: |
echo "unlock"
BW_SESSION=$(bw unlock {{ bw_password }} --raw)
echo "get item"
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.stackarr.mangareader.secret", dest: "/tmp/stack-arr/mangareader/kubernetes-files/files/mangareader-secret.yaml" }
args:
executable: /bin/bash
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/mangareader/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/mangareader/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,15 @@
apiVersion: v1
kind: ConfigMap
metadata:
name: minecraft-configmap
namespace: minecraft
data:
SERVER_NAME: "Example Minecraft Server"
EULA: "true"
VERSION: "1.21.1"
MAX_PLAYERS: "10"
OPS: |
tomas
ENABLE_WHITELIST: "true"
WHITELIST: |
tomas

View File

@ -0,0 +1,4 @@
apiVersion: v1
kind: Namespace
metadata:
name: minecraft

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: minecraft-nfs-csi
namespace: minecraft
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/Minecraft/TI0
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,29 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: minecraft-config-pv
namespace: minecraft
spec:
capacity:
storage: 30Gi
storageClassName: minecraft-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Minecraft/TI0
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: minecraft-config-pvc
namespace: minecraft
spec:
storageClassName: minecraft-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: minecraft-config-pv
resources:
requests:
storage: 30Gi

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: minecraft-service
namespace: stack-arr
spec:
ports:
- port: 19132
protocol: UDP
selector:
app: minecraft
type: ClusterIP

View File

@ -0,0 +1,46 @@
apiVersion: apps/v1
kind: StatefulSet
metadata:
name: minecraft
namespace: minecraft
spec:
replicas: 1
selector:
matchLabels:
app: minecraft
template:
metadata:
labels:
app: minecraft
spec:
securityContext:
runAsNonRoot: true
runAsUser: 1013
fsGroup: 1013
imagePullSecrets:
- name: regcred
containers:
- name: minecraft
image: itzg/minecraft-server
stdin: true
tty: true
resources:
requests:
cpu: 2
memory: 5Gi
envFrom:
- configMapRef:
name: minecraft-configmap
ports:
- containerPort: 19132
name: serverport
volumeMounts:
- name: data
mountPath: /data
volumes:
- name: data
persistentVolumeClaim:
claimName: minecraft-config-pvc

View File

@ -0,0 +1,52 @@
- name: Remover o diretório /tmp/stack-arr/minecraft/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/minecraft/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/minecraft/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/minecraft/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.minecraft.secret", dest: "/tmp/stack-arr/minecraft/kubernetes-files/files/minecraft-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/minecraft/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/minecraft/kubernetes-files/files/minecraft-namespace.yaml
kubectl apply -f /tmp/stack-arr/minecraft/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,17 @@
apiVersion: v1
kind: ConfigMap
metadata:
name: time-slicing-config-all
namespace: gpu-operator
data:
any: |-
version: v1
flags:
migStrategy: none
sharing:
timeSlicing:
renameByDefault: false
failRequestsGreaterThanOne: false
resources:
- name: nvidia.com/gpu
replicas: 4

View File

@ -15,3 +15,53 @@
- name: Mostrar resultado do nvida gpu Driver
debug:
var: resultado_nvidia.stdout_lines
- name: Remover o diretório /tmp/nvidia/kubernetes-files
ansible.builtin.file:
path: /tmp/nvidia/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/nvidia/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/nvidia/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/nvidia/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o files
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/nvidia/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config
- name: Aplicar o files
become: yes
become_user: fenix
shell: |
kubectl patch clusterpolicies.nvidia.com/cluster-policy -n gpu-operator --type merge -p "{\"spec\": {\"devicePlugin\": {\"config\": {\"name\": \"time-slicing-config-all\", \"default\": \"any\"}}}}"
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -42,7 +42,7 @@ spec:
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/bittorrent/downloads
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series/Downloads
---
apiVersion: v1
kind: PersistentVolumeClaim

View File

@ -0,0 +1,56 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: shelfarr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: shelfarr
template:
metadata:
labels:
app: shelfarr
spec:
imagePullSecrets:
- name: regcred
containers:
- name: shelfarr
image: ghcr.io/pedro-revez-silva/shelfarr:c49adad
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 5056
name: webui
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: HTTP_PORT
value: "5056"
- name: TZ
value: 'Etc/UTC'
volumeMounts:
- name: config
mountPath: /rails/storage
- name: books
mountPath: /books
- name: downloads
mountPath: /downloads
volumes:
- name: config
persistentVolumeClaim:
claimName: shelfarr-config-pvc
- name: books
persistentVolumeClaim:
claimName: shelfarr-books-pvc
- name: downloads
persistentVolumeClaim:
claimName: qbittorrent-downloads-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: shelfarr-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/shelfarr
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,60 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: shelfarr-config-pv
namespace: stack-arr
spec:
capacity:
storage: 20Gi
storageClassName: shelfarr-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/shelfarr/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: shelfarr-config-pvc
namespace: stack-arr
spec:
storageClassName: shelfarr-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: shelfarr-config-pv
resources:
requests:
storage: 20Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: shelfarr-media-pv
namespace: stack-arr
spec:
capacity:
storage: 150Gi
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series/Livros
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: shelfarr-books-pvc
namespace: stack-arr
spec:
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: shelfarr-media-pv
resources:
requests:
storage: 150Gi
---

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: shelfarr-service
namespace: stack-arr
spec:
ports:
- port: 5056
targetPort: 5056
selector:
app: shelfarr
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/shelfarr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/shelfarr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/shelfarr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/shelfarr/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.shelfarr.secret", dest: "/tmp/stack-arr/shelfarr/kubernetes-files/files/shelfarr-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/shelfarr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/shelfarr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -36,7 +36,7 @@
- name: Instalar Bitwarden CLI via npm
become: true
shell: npm install -g @bitwarden/cli
shell: npm install -g @bitwarden/cli@2025.11.0
args:
executable: /bin/bash
@ -51,6 +51,7 @@
- name: Fazer login no Bitwarden
shell: |
bw --version
echo "config"
echo "VAULTWARDEN_LINK: {{ VAULTWARDEN_LINK }}"
bw config server {{ VAULTWARDEN_LINK }}

View File

@ -0,0 +1,42 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: whisperasr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: whisperasr
template:
metadata:
labels:
app: whisperasr
spec:
imagePullSecrets:
- name: regcred
volumes:
- name: whisperasr-model
persistentVolumeClaim:
claimName: whisperasr-model-pvc
containers:
- name: whisperasr
image: onerahmet/openai-whisper-asr-webservice:latest-gpu
ports:
- containerPort: 9000
name: api
env:
- name: ASR_MODEL
value: medium
- name: ASR_ENGINE
value: faster_whisper
- name: ASR_MODEL_PATH
value: /data/whisper
resources:
limits:
nvidia.com/gpu: '1'
volumeMounts:
- name: whisperasr-model
mountPath: /data/whisper
securityContext:
privileged: true

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: whisperasr-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/whisperasr
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,29 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: whisperasr-model-pv
namespace: stack-arr
spec:
capacity:
storage: 30Gi
storageClassName: whisperasr-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/whisperasr/model2
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: whisperasr-model-pvc
namespace: stack-arr
spec:
storageClassName: whisperasr-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: whisperasr-model-pv
resources:
requests:
storage: 30Gi

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: whisperasr-service
namespace: stack-arr
spec:
ports:
- port: 9000
targetPort: 9000
selector:
app: whisperasr
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/whisperasr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/whisperasr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/whisperasr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/whisperasr/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.radarr.secret", dest: "/tmp/stack-arr/radarr/kubernetes-files/files/radarr-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/whisperasr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/whisperasr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"