Compare commits

..

92 Commits

Author SHA1 Message Date
9297ee3964 minecraft user nfs 2026-03-05 18:28:58 +00:00
0a0e3982e8 java edition 2026-03-05 18:16:18 +00:00
c0ac96265e correction pvc minecraft 2026-03-05 18:05:12 +00:00
71fe67c1e0 minecraft server port correction 2026-03-05 12:48:05 +00:00
8a49477449 minecraft added 2026-03-05 12:15:42 +00:00
46505df323 BOOKS 2026-02-08 18:14:11 +00:00
0294601e2c vaultwarden there is a bug in a version 2026-01-23 21:39:29 +00:00
1e827ede7b bitwarden passado 2026-01-23 20:30:04 +00:00
d8e54b6af4 mangareader 2026-01-23 20:11:16 +00:00
7f42b439c9 Merge branch 'main' of https://gitea.fenix-dev.com/fenix-gitea-admin/iac-ansible-private 2026-01-23 11:54:29 +00:00
67dc792660 deploy 2026-01-23 11:54:18 +00:00
128823f456 lazylibrarian, bookshelf, suwayomi (mangareader),, shelfarr
testes
2026-01-23 11:52:58 +00:00
9e703cf9fd anchorr 2026-01-21 16:51:47 +00:00
8ccda6978e logo no readme 2026-01-21 16:20:14 +00:00
f832f2ad37 upload logo
upload logo
2026-01-21 16:18:24 +00:00
f7c345e505 lingarr e libreTranslate 2026-01-05 20:57:50 +00:00
5460418ecb whipearr lingrrr, vai ser trocado agora por libretrasnlate 2026-01-05 15:18:13 +00:00
696c542b6b nvidia time slicing and bazzar 2026-01-04 14:24:53 +00:00
0fda7f84ba bazarr 2026-01-03 14:45:07 +00:00
82f9ab4ead ai 2025-12-30 01:11:28 +00:00
51c4466103 nvidia with helm 2025-12-09 19:52:50 +00:00
cb1bf070b0 nvidia-base vsnvidia frfom kubernetes 2025-12-08 19:31:29 +00:00
8dec820f1d nvidia for kubernetes 2025-12-08 19:01:39 +00:00
31f624c429 containerd 2025-12-08 18:47:24 +00:00
955d1ac2f2 apt install 2025-12-08 18:25:47 +00:00
4377f5917c list packages corrected 2025-12-08 17:50:47 +00:00
4eb7726ed8 creaters 2025-12-08 17:42:58 +00:00
369b8dae80 correctioin adding repositorio nvidia 2025-12-08 17:27:56 +00:00
1c24b3e030 fenix no more 2025-12-08 17:08:37 +00:00
607a6b82c3 Adicionar repositório NVIDIA 2025-12-08 16:58:05 +00:00
3c4fab1534 correction task nvidia 2025-12-08 16:35:49 +00:00
4b1fa18f7f a 2025-12-08 16:31:39 +00:00
40b8d89ee7 nvidia in all nodes 2025-12-08 16:25:54 +00:00
bdda2191c4 qbit 2025-12-08 14:35:20 +00:00
6c5290a118 Update roles/stolon/tasks/main.yml 2025-12-02 14:59:43 +00:00
b857640bf6 declutarr 2025-12-02 14:12:42 +00:00
ff0f048859 radarr call 2025-11-13 22:30:09 +00:00
78659b1c77 radarr 2025-11-13 22:29:04 +00:00
32ef4ccb0d decluttarr readme 2025-11-13 20:38:59 +00:00
b509854496 decluttarr 2025-11-13 19:17:24 +00:00
c51a7d81be decluttarr 2025-11-13 17:34:15 +00:00
b053fc8019 sonarr animes folder 2025-11-13 15:49:39 +00:00
0cb3784757 jellyseerr 2025-11-13 13:30:09 +00:00
2115a8aa61 Update README.md 2025-11-13 13:04:50 +00:00
076cb81c9d flaresolverr 2025-11-13 13:02:08 +00:00
bdafea0784 flaresolverr 2025-11-13 13:01:39 +00:00
3b5d59a589 Merge branch 'main' of https://gitea.fenix-dev.com/fenix-gitea-admin/iac-ansible-private 2025-11-12 20:14:49 +00:00
3c07b1b998 jellyfin 2025-11-12 20:14:43 +00:00
dbbcc45525 Update roles/stolon/tasks/main.yml 2025-11-12 17:30:06 +00:00
d3981868cf run cloudflare 2025-11-12 17:19:18 +00:00
6c78b7ce39 cloudflare 2025-11-12 17:18:40 +00:00
ebd772665b Update roles/stolon/tasks/main.yml 2025-11-12 16:05:29 +00:00
21d91805ad sonarr added 2025-11-12 14:39:00 +00:00
c00cd6a94f prowlar service 2025-11-12 12:55:35 +00:00
a34e5a5e8b Update roles/stolon/tasks/main.yml 2025-11-11 22:44:50 +00:00
71ec9945b1 prowlarr call 2025-11-11 21:57:18 +00:00
11dbff9b8a added prowlarr 2025-11-11 21:47:46 +00:00
fecbc54b79 qbit service and documentation 2025-11-11 19:44:44 +00:00
d693a947f2 Merge branch 'main' of https://gitea.fenix-dev.com/fenix-gitea-admin/iac-ansible-private 2025-11-11 19:15:13 +00:00
8c882adffe new qbittorrent image 2025-11-11 19:14:35 +00:00
fff458af5a Update roles/qbittorrent/files/qbittorrent-deployment.yaml 2025-11-11 17:43:12 +00:00
de1925a486 Update roles/qbittorrent/tasks/main.yml 2025-11-11 17:34:05 +00:00
2fdee619ca Merge branch 'main' of https://gitea.fenix-dev.com/fenix-gitea-admin/iac-ansible-private 2025-11-11 16:06:28 +00:00
47411136d0 role changing position 2025-11-11 16:06:20 +00:00
08a0bb3761 Update playbook.yml 2025-11-11 15:59:58 +00:00
27b924b558 bittorrent 2025-11-11 15:48:09 +00:00
d460624689 Update roles/stolon/tasks/main.yml 2025-11-10 23:30:03 +00:00
676cc04dd4 Merge branch 'main' of https://gitea.fenix-dev.com/fenix-gitea-admin/iac-ansible-private 2025-11-10 23:13:41 +00:00
e62baff9e7 stolon 2025-11-10 23:13:36 +00:00
f532ff4507 Update roles/kubernetes/tasks/main.yml 2025-11-10 13:06:53 +00:00
dd420b851c a 2025-11-09 19:51:10 +00:00
07698ad8a3 Merge branch 'main' of https://gitea.fenix-dev.com/fenix-gitea-admin/iac-ansible-private 2025-11-09 14:12:56 +00:00
b981b12635 fsgroup 2025-11-09 14:12:46 +00:00
5441e7852e Update roles/kube-master/tasks/main.yml 2025-11-07 16:17:41 +00:00
5df04be859 Update roles/kube-master/tasks/main.yml 2025-11-07 15:23:44 +00:00
baa06e11d3 Update roles/kube-master/tasks/main.yml 2025-11-07 14:53:52 +00:00
3afed3f5bd Update roles/kube-master/tasks/main.yml 2025-11-07 14:36:21 +00:00
5d82af3236 Update roles/kube-master/tasks/main.yml 2025-11-07 12:03:49 +00:00
946621ae59 Update roles/kube-master/tasks/main.yml 2025-11-07 11:58:32 +00:00
d6d5a94fd1 Update roles/stolon/tasks/main.yml 2025-11-07 11:29:39 +00:00
d47040565a Update roles/stolon/tasks/main.yml 2025-11-06 21:49:25 +00:00
a794dcd037 Update roles/stolon/tasks/main.yml 2025-11-06 21:38:24 +00:00
fee0b08777 Update roles/stolon/tasks/main.yml 2025-11-06 21:33:23 +00:00
d047d1da32 Update roles/stolon/tasks/main.yml 2025-11-06 21:31:08 +00:00
0d93657131 Update roles/stolon/tasks/main.yml 2025-11-06 21:11:20 +00:00
1b1d683d38 Update roles/kube-master/tasks/main.yml 2025-11-06 20:30:04 +00:00
2bca89aa2d Update roles/kube-master/tasks/main.yml 2025-11-06 20:19:52 +00:00
e2450e477a Update roles/kube-master/tasks/main.yml 2025-11-06 15:16:57 +00:00
4be17277b9 Update roles/kube-master/tasks/patch_netconf.py 2025-11-06 14:41:55 +00:00
f45445443f Update roles/kube-master/tasks/main.yml 2025-11-06 14:12:25 +00:00
9e50c6c110 Update roles/kube-master/tasks/main.yml 2025-11-05 15:07:47 +00:00
1e20c82f27 Update roles/kube-master/tasks/main.yml 2025-11-05 14:03:16 +00:00
139 changed files with 4201 additions and 16 deletions

View File

@ -1,3 +1,18 @@
# iac-ansible-private
iac-ansible-private
iac-ansible-private
stolon comes from https://github.com/sorintlab/stolon/blob/master/examples/kubernetes/README.md
qbittorrent comes from https://github.com/j4ym0/pia-qbittorrent-docker?tab=readme-ov-file
prowlarr comes from https://docs.linuxserver.io/images/docker-prowlarr/#docker-mods
and https://wiki.servarr.com/prowlarr/environment-variables
sonarr comes from https://wiki.servarr.com/sonarr/environment-variables
and https://docs.linuxserver.io/images/docker-sonarr/#supported-architectures
jellyfin comes from https://docs.linuxserver.io/images/docker-jellyfin/
flaresolverr comes from https://github.com/FlareSolverr/FlareSolverr
jellyseer comes from https://hub.docker.com/r/fallenbagel/jellyseerr
and https://docs.seerr.dev/extending-jellyseerr/database-config
decluttarr comes from https://github.com/ManiMatter/decluttarr
minecraft comes from https://www.civo.com/learn/deploying-minecraft-server-kubernetes
![logo](fenix-iac.png)

BIN
fenix-iac.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.0 MiB

View File

@ -6,7 +6,7 @@
- vaultwarden
- kubernetes
- kube-master
- stolon
- nvidia-base
- name: Configure Kubernetes Nodes
hosts: workers
@ -16,3 +16,30 @@
- vaultwarden
- kubernetes
- kube-node
- nvidia-base
- name: Configure Kubernetes Data
hosts: master
become: yes
roles:
- nvidia
- stolon
- cloudflared
- qbittorrent
- prowlarr
- sonarr
- radarr
- jellyfin
- flaresolverr
- jellyseerr
- decluttarr
- bazarr
- libreTranslate
- lingarr
- cripto
- anchorr
- lazylibrarian
- mangareader
- bookshelf
- shelfarr
- minecraft

View File

@ -0,0 +1,46 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: anchorr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: anchorr
template:
metadata:
labels:
app: anchorr
spec:
imagePullSecrets:
- name: regcred
containers:
- name: anchorr
image: nairdah/anchorr:latest
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 8282
name: webhook
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
- name: NODE_ENV
value: 'production'
- name: WEBHOOK_PORT
value: '8282'
volumeMounts:
- name: config
mountPath: /usr/src/app/config
volumes:
- name: config
persistentVolumeClaim:
claimName: anchorr-config-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: anchorr-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/anchorr
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,29 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: anchorr-config-pv
namespace: stack-arr
spec:
capacity:
storage: 2Gi
storageClassName: anchorr-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/anchorr/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: anchorr-config-pvc
namespace: stack-arr
spec:
storageClassName: anchorr-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: anchorr-config-pv
resources:
requests:
storage: 2Gi

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: anchorr-service
namespace: stack-arr
spec:
ports:
- port: 8282
targetPort: 8282
selector:
app: anchorr
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/anchorr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/anchorr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/anchorr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/anchorr/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.anchorr.secret", dest: "/tmp/stack-arr/anchorr/kubernetes-files/files/anchorr-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/anchorr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/anchorr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,70 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: bazarr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: bazarr
template:
metadata:
labels:
app: bazarr
spec:
imagePullSecrets:
- name: regcred
containers:
- name: bazarr
image: lscr.io/linuxserver/bazarr:1.5.3
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 6767
name: webui
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
- name: POSTGRES_ENABLED
value: 'true'
- name: POSTGRES_HOST
value: 'stolon-proxy-service.postgresql.svc.cluster.local'
- name: POSTGRES_PORT
value: '5432'
- name: POSTGRES_USERNAME
valueFrom:
secretKeyRef:
name: bazarr-secret
key: username
- name: POSTGRES_PASSWORD
valueFrom:
secretKeyRef:
name: bazarr-secret
key: password
- name: POSTGRES_DATABASE
valueFrom:
secretKeyRef:
name: bazarr-secret
key: maindb
volumeMounts:
- name: config
mountPath: /config
- name: media
mountPath: /media
volumes:
- name: config
persistentVolumeClaim:
claimName: bazarr-config-pvc
- name: media
persistentVolumeClaim:
claimName: bazarr-media-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: bazarr-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/bazarr
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,60 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: bazarr-config-pv
namespace: stack-arr
spec:
capacity:
storage: 2Gi
storageClassName: bazarr-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/bazarr/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: bazarr-config-pvc
namespace: stack-arr
spec:
storageClassName: bazarr-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: bazarr-config-pv
resources:
requests:
storage: 2Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: bazarr-media-pv
namespace: stack-arr
spec:
capacity:
storage: 150Gi
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: bazarr-media-pvc
namespace: stack-arr
spec:
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: bazarr-media-pv
resources:
requests:
storage: 150Gi
---

View File

@ -0,0 +1,11 @@
apiVersion: v1
kind: Secret
metadata:
name: bazarr-secret
namespace: stack-arr
type: Opaque
data:
username: dXNlcm5hbWU=
password: cGFzc3dvcmQ=
maindb: bWFpbmRiLXByb3dsYXJy
logsdb: bG9nZGItcHJvd2xhcnI=

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: bazarr-service
namespace: stack-arr
spec:
ports:
- port: 6767
targetPort: 6767
selector:
app: bazarr
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/bazarr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/bazarr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/bazarr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/bazarr/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Obter várias notas do Bitwarden
shell: |
echo "unlock"
BW_SESSION=$(bw unlock {{ bw_password }} --raw)
echo "get item"
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.stackarr.bazarr.secret", dest: "/tmp/stack-arr/bazarr/kubernetes-files/files/bazarr-secret.yaml" }
args:
executable: /bin/bash
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/bazarr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/bazarr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,54 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: bookshelf
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: bookshelf
template:
metadata:
labels:
app: bookshelf
spec:
imagePullSecrets:
- name: regcred
containers:
- name: bookshelf
image: ghcr.io/pennydreadful/bookshelf:softcover-v0.4.20.91
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 8787
name: webui
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
volumeMounts:
- name: config
mountPath: /config
- name: books
mountPath: /books
- name: downloads
mountPath: /downloads
volumes:
- name: config
persistentVolumeClaim:
claimName: bookshelf-config-pvc
- name: books
persistentVolumeClaim:
claimName: bookshelf-books-pvc
- name: downloads
persistentVolumeClaim:
claimName: qbittorrent-downloads-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: bookshelf-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/bookshelf
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,60 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: bookshelf-config-pv
namespace: stack-arr
spec:
capacity:
storage: 20Gi
storageClassName: bookshelf-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/bookshelf/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: bookshelf-config-pvc
namespace: stack-arr
spec:
storageClassName: bookshelf-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: bookshelf-config-pv
resources:
requests:
storage: 20Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: bookshelf-media-pv
namespace: stack-arr
spec:
capacity:
storage: 150Gi
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series/Livros
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: bookshelf-books-pvc
namespace: stack-arr
spec:
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: bookshelf-media-pv
resources:
requests:
storage: 150Gi
---

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: bookshelf-service
namespace: stack-arr
spec:
ports:
- port: 8787
targetPort: 8787
selector:
app: bookshelf
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/bookshelf/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/bookshelf/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/bookshelf/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/bookshelf/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.bookshelf.secret", dest: "/tmp/stack-arr/bookshelf/kubernetes-files/files/bookshelf-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/bookshelf/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/bookshelf/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,4 @@
apiVersion: v1
kind: Namespace
metadata:
name: cloudflare

View File

@ -0,0 +1,49 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: cloudflared-tunnel
namespace: cloudflare
spec:
replicas: 3
selector:
matchLabels:
app: cloudflared
template:
metadata:
labels:
app: cloudflared
spec:
securityContext:
sysctls:
# Allows ICMP traffic (ping, traceroute) to resources behind cloudflared.
- name: net.ipv4.ping_group_range
value: "65532 65532"
containers:
- image: cloudflare/cloudflared:latest
name: cloudflared
env:
# Defines an environment variable for the tunnel token.
- name: TUNNEL_TOKEN
valueFrom:
secretKeyRef:
name: tunnel-token-secret
key: token
command:
# Configures tunnel run parameters
- cloudflared
- tunnel
- --no-autoupdate
- --loglevel
- debug
- --metrics
- 0.0.0.0:2000
- run
livenessProbe:
httpGet:
# Cloudflared has a /ready endpoint which returns 200 if and only if
# it has an active connection to Cloudflare's network.
path: /ready
port: 2000
failureThreshold: 1
initialDelaySeconds: 10
periodSeconds: 10

View File

@ -0,0 +1,8 @@
apiVersion: v1
kind: Secret
metadata:
name: tunnel-token-secret
namespace: cloudflare
type: Opaque
data:
token: <CLOUDFLARE_TUNNEL_TOKEN>

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/cloudflare/kubernetes-files
ansible.builtin.file:
path: /tmp/cloudflare/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/cloudflare/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/cloudflare/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Obter várias notas do Bitwarden
shell: |
echo "unlock"
BW_SESSION=$(bw unlock {{ bw_password }} --raw)
echo "get item"
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.cloudflare.tunnel.secret", dest: "/tmp/cloudflare/kubernetes-files/files/tunnel-token-secret.yaml" }
args:
executable: /bin/bash
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/cloudflare/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/cloudflare/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,94 @@
apiVersion: v1
kind: Namespace
metadata:
name: fenix-ai
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: crypto-forecast-api-deployment
namespace: fenix-ai
spec:
replicas: 0
selector:
matchLabels:
app: crypto-forecast-api
template:
metadata:
labels:
app: crypto-forecast-api
spec:
containers:
- name: crypto-forecast-api
image: gitea.fenix-dev.com/fenix-gitea-admin/fenix-cripto-api:0.0.19
ports:
- containerPort: 8080
resources:
limits:
nvidia.com/gpu: 1 # garante uso da tua RTX 4060 Ti
env:
- name: ASPNETCORE_ENVIRONMENT
value: Development
volumeMounts:
- name: model
mountPath: /models
volumes:
- name: model
persistentVolumeClaim:
claimName: crypto-forecast-api-model-pvc
---
apiVersion: v1
kind: Service
metadata:
name: crypto-forecast-api-svc
namespace: fenix-ai
spec:
selector:
app: crypto-forecast-api
ports:
- protocol: TCP
port: 8080
targetPort: 8080
type: NodePort # ou LoadBalancer se tiveres suporte
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: crypto-forecast-api-model-pv
namespace: fenix-ai
spec:
capacity:
storage: 20Gi
storageClassName: fenix-ai-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/fenix/ai/api/model
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: crypto-forecast-api-model-pvc
namespace: fenix-ai
spec:
storageClassName: fenix-ai-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: crypto-forecast-api-model-pv
resources:
requests:
storage: 20Gi
---
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: fenix-ai-nfs-csi
namespace: fenix-ai
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,4 @@
apiVersion: v1
kind: Namespace
metadata:
name: fenix-ai

View File

@ -0,0 +1,97 @@
apiVersion: metallb.io/v1beta1
kind: IPAddressPool
metadata:
name: local-pool-2
namespace: metallb-system
spec:
addresses:
- 192.168.1.100-192.168.1.200
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: ollama-deployment
namespace: fenix-ai
spec:
replicas: 1
selector:
matchLabels:
app: ollama
template:
metadata:
labels:
app: ollama
spec:
containers:
- name: ollama
image: ollama/ollama:latest
ports:
- containerPort: 11434
resources:
limits:
nvidia.com/gpu: 1 # garante uso da tua RTX 4060 Ti
env:
- name: OLLAMA_HOST
value: "0.0.0.0"
volumeMounts:
- name: ollama-data
mountPath: /root/.ollama
volumes:
- name: ollama-data
persistentVolumeClaim:
claimName: ollama-data-pvc
---
apiVersion: v1
kind: Service
metadata:
name: ollama-api-svc
namespace: fenix-ai
spec:
selector:
app: ollama
ports:
- protocol: TCP
port: 11434
targetPort: 11434
type: NodePort # ou LoadBalancer se tiveres suporte
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: ollama-data-pv
namespace: fenix-ai
spec:
capacity:
storage: 20Gi
storageClassName: ollama-ai-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/ollama
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: ollama-data-pvc
namespace: fenix-ai
spec:
storageClassName: ollama-ai-nfs-csi
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 20Gi
---
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: ollama-ai-nfs-csi
namespace: fenix-ai
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/ollama
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/fenix-ai/kubernetes-files
ansible.builtin.file:
path: /tmp/fenix-ai/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/fenix-ai/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/fenix-ai/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.decluttarr.secret", dest: "/tmp/stack-arr/decluttarr/kubernetes-files/files/decluttarr-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/fenix-ai/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/fenix-ai/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,79 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: decluttarr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: decluttarr
template:
metadata:
labels:
app: decluttarr
spec:
imagePullSecrets:
- name: regcred
containers:
- name: decluttarr
image: ghcr.io/manimatter/decluttarr:v1.50.2
env:
- name: LOG_LEVEL
value: VERBOSE
- name: REMOVE_TIMER
value: '3'
- name: REMOVE_FAILED
value: 'True'
- name: REMOVE_FAILED_IMPORTS
value: 'False'
- name: REMOVE_METADATA_MISSING
value: 'True'
- name: REMOVE_MISSING_FILES
value: 'True'
- name: REMOVE_ORPHANS
value: 'True'
- name: REMOVE_SLOW
value: 'False'
- name: REMOVE_STALLED
value: 'True'
- name: REMOVE_UNMONITORED
value: 'False'
- name: MIN_DOWNLOAD_SPEED
value: '100'
- name: PERMITTED_ATTEMPTS
value: '3'
- name: SONARR_URL
value: http://sonarr-service.stack-arr.svc.cluster.local:8989
- name: SONARR_KEY
valueFrom:
secretKeyRef:
name: decluttarr-secret
key: sonarrkey
- name: QBITTORRENT_URL
value: http://qbittorrent-service.stack-arr.svc.cluster.local:8080
- name: QBITTORRENT_USERNAME
valueFrom:
secretKeyRef:
name: decluttarr-secret
key: qbittorrentuser
- name: QBITTORRENT_PASSWORD
valueFrom:
secretKeyRef:
name: decluttarr-secret
key: qbittorrentpass
volumeMounts:
- name: config
mountPath: /config
- name: downloads
mountPath: /data/downloads
volumes:
- name: config
persistentVolumeClaim:
claimName: decluttarr-config-pvc
- name: downloads
persistentVolumeClaim:
claimName: qbittorrent-downloads-pvc

View File

@ -0,0 +1,12 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: decluttarr-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/decluttarr
allowVolumeExpansion: true
reclaimPolicy: Retain
---

View File

@ -0,0 +1,30 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: decluttarr-config-pv
namespace: stack-arr
spec:
capacity:
storage: 2Gi
storageClassName: decluttarr-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/decluttarr/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: decluttarr-config-pvc
namespace: stack-arr
spec:
storageClassName: decluttarr-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: decluttarr-config-pv
resources:
requests:
storage: 2Gi
---

View File

@ -0,0 +1,10 @@
apiVersion: v1
kind: Secret
metadata:
name: decluttarr-secret
namespace: stack-arr
type: Opaque
data:
sonarrkey: M2tkMDRscjk1bGY5M29lMDNsZTAzbGU=
qbittorrentuser: dXNlcg==
qbittorrentpass: cGFzcw==

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/decluttarr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/decluttarr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/decluttarr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/decluttarr/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Obter várias notas do Bitwarden
shell: |
echo "unlock"
BW_SESSION=$(bw unlock {{ bw_password }} --raw)
echo "get item"
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.stackarr.decluttarr.secret", dest: "/tmp/stack-arr/decluttarr/kubernetes-files/files/decluttarr-secret.yaml" }
args:
executable: /bin/bash
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/decluttarr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/decluttarr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,32 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: flaresolverr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: flaresolverr
template:
metadata:
labels:
app: flaresolverr
spec:
imagePullSecrets:
- name: regcred
containers:
- name: flaresolverr
image: ghcr.io/flaresolverr/flaresolverr:latest
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 8191
name: porta
env:
- name: LOG_LEVEL
value: "info"

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: flaresolverr-service
namespace: stack-arr
spec:
ports:
- port: 8191
targetPort: 8191
selector:
app: flaresolverr
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/sonarr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/sonarr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/sonarr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/sonarr/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.sonarr.secret", dest: "/tmp/stack-arr/sonarr/kubernetes-files/files/sonarr-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/sonarr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/sonarr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,65 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: jellyfin
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: jellyfin
template:
metadata:
labels:
app: jellyfin
spec:
imagePullSecrets:
- name: regcred
containers:
- name: jellyfin
image: lscr.io/linuxserver/jellyfin:10.11.5
resources:
limits:
memory: "9G" # Maximum memory allowed
cpu: "4" # Maximum CPU allowed
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 8096
name: webui
- containerPort: 8920
name: webuihttps
- containerPort: 1900
name: dlnaudp
- containerPort: 7359
name: discoveryudp
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
volumeMounts:
- name: config
mountPath: /config
- name: videos
mountPath: /videos
- name: books
mountPath: /books
volumes:
- name: config
persistentVolumeClaim:
claimName: jellyfin-config-pvc
- name: videos
persistentVolumeClaim:
claimName: jellyfin-videos-pvc
- name: books
persistentVolumeClaim:
claimName: jellyfin-books-pvc

View File

@ -0,0 +1,23 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: jellyfin-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/jellyfin
allowVolumeExpansion: true
reclaimPolicy: Retain
---
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: jellyfin-videos-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,93 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: jellyfin-config-pv
namespace: stack-arr
spec:
capacity:
storage: 2Gi
storageClassName: jellyfin-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/jellyfin/config
mountOptions:
- nolock
- nfsvers=3
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: jellyfin-config-pvc
namespace: stack-arr
spec:
storageClassName: jellyfin-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: jellyfin-config-pv
resources:
requests:
storage: 2Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: jellyfin-videos-pv
namespace: stack-arr
spec:
capacity:
storage: 150Gi
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: jellyfin-videos-pvc
namespace: stack-arr
spec:
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: jellyfin-videos-pv
resources:
requests:
storage: 150Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: jellyfin-books-pv
namespace: stack-arr
spec:
capacity:
storage: 150Gi
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series/Livros
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: jellyfin-books-pvc
namespace: stack-arr
spec:
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: jellyfin-books-pv
resources:
requests:
storage: 150Gi
---

View File

@ -0,0 +1,22 @@
apiVersion: v1
kind: Service
metadata:
name: jellyfin-service
namespace: stack-arr
spec:
ports:
- port: 8096
targetPort: 8096
name: webui
- port: 8920
targetPort: 8920
name: webuihttps
- port: 1900
targetPort: 1900
name: dlnaudp
- port: 7359
targetPort: 7359
name: discoveryudp
selector:
app: jellyfin
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/jellyfin/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/jellyfin/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/jellyfin/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/jellyfin/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.jellyfin.secret", dest: "/tmp/stack-arr/jellyfin/kubernetes-files/files/jelly-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/jellyfin/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/jellyfin/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,62 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: jellyseerr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: jellyseerr
template:
metadata:
labels:
app: jellyseerr
spec:
imagePullSecrets:
- name: regcred
containers:
- name: jellyseerr
image: fallenbagel/jellyseerr:2.7.3
ports:
- containerPort: 5055
name: webui
env:
- name: TZ
value: 'Etc/UTC'
- name: LOG_LEVEL
value: 'debug'
- name: DB_TYPE
value: 'postgres'
- name: DB_HOST
value: 'stolon-proxy-service.postgresql.svc.cluster.local'
- name: DB_PORT
value: '5432'
- name: DB_USER
valueFrom:
secretKeyRef:
name: jellyseerr-secret
key: username
- name: DB_PASS
valueFrom:
secretKeyRef:
name: jellyseerr-secret
key: password
- name: DB_NAME
valueFrom:
secretKeyRef:
name: jellyseerr-secret
key: maindb
- name: DB_LOG_QUERIES
value: 'false'
volumeMounts:
- name: config
mountPath: /app/config
volumes:
- name: config
persistentVolumeClaim:
claimName: jellyseerr-config-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: jellyseerr-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/jellyseerr
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,30 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: jellyseerr-config-pv
namespace: stack-arr
spec:
capacity:
storage: 2Gi
storageClassName: jellyseerr-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/jellyseerr/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: jellyseerr-config-pvc
namespace: stack-arr
spec:
storageClassName: jellyseerr-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: jellyseerr-config-pv
resources:
requests:
storage: 2Gi
---

View File

@ -0,0 +1,10 @@
apiVersion: v1
kind: Secret
metadata:
name: jellyseerr-secret
namespace: stack-arr
type: Opaque
data:
username: dXNlcm5hbWU=
password: cGFzc3dvcmQ=
maindb: bWFpbmRiLXByb3dsYXJy

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: jellyseerr-service
namespace: stack-arr
spec:
ports:
- port: 5055
targetPort: 5055
selector:
app: jellyseerr
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/jellyseerr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/jellyseerr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/jellyseerr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/jellyseerr/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Obter várias notas do Bitwarden
shell: |
echo "unlock"
BW_SESSION=$(bw unlock {{ bw_password }} --raw)
echo "get item"
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.stackarr.jellyseerr.secret", dest: "/tmp/stack-arr/jellyseerr/kubernetes-files/files/jellyseerr-secret.yaml" }
args:
executable: /bin/bash
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/jellyseerr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/jellyseerr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -22,7 +22,7 @@
replace:
path: /tmp/kube-flannel.yml
regexp: '10\.244\.0\.0/16'
replace: '10.244.0.0/16' # .3.
replace: '10.240.0.0/16' # .3.
- name: Corrigir net-conf.json no manifest do Flannel
become: true
@ -45,7 +45,7 @@
ansible.builtin.lineinfile:
path: /tmp/kube-flannel.yml
insertafter: ' - --kube-subnet-mgr'
line: ' - --iface=eth1'
line: ' - --iface=eth0'
@ -55,8 +55,9 @@
argv:
- kubeadm
- init
- --pod-network-cidr=10.244.0.0/16 # .3.
#- --apiserver-advertise-address=192.168.2.50
- --pod-network-cidr=10.240.0.0/16 # .3.
- --apiserver-advertise-address=192.168.1.50
- --service-cidr=10.95.0.0/16
creates: /etc/kubernetes/admin.conf
@ -102,6 +103,37 @@
delay: 6
become: yes
- name: kubernetes untaint node-role.kubernetes.io/control-plane:NoSchedule
become: true
shell: |
kubectl taint nodes --all node-role.kubernetes.io/control-plane:NoSchedule-
become_user: fenix
environment:
KUBECONFIG: /home/fenix/.kube/config
ignore_errors: yes
- name: kubernetes unlabel node-role.kubernetes.io/control-plane
become: true
shell: |
kubectl label nodes --all node-role.kubernetes.io/control-plane-
become_user: fenix
environment:
KUBECONFIG: /home/fenix/.kube/config
ignore_errors: yes
- name: kubernetes unlabel node.kubernetes.io/exclude-from-external-load-balancers
become: true
shell: |
kubectl label nodes --all node.kubernetes.io/exclude-from-external-load-balancers-
become_user: fenix
environment:
KUBECONFIG: /home/fenix/.kube/config
ignore_errors: yes
- name: cat flannel
become: true
shell: |
@ -161,6 +193,53 @@
var: resultado_nfs.stdout_lines
- name: Instalar MetalLB (manifest oficial)
shell: kubectl apply -f https://raw.githubusercontent.com/metallb/metallb/v0.13.9/config/manifests/metallb-native.yaml
become_user: fenix
environment:
KUBECONFIG: /home/fenix/.kube/config
- name: Esperar pelo webhook do MetalLB
shell: kubectl get endpoints webhook-service -n metallb-system -o jsonpath='{.subsets[*].addresses[*].ip}'
register: webhook_ready
until: webhook_ready.stdout != ""
retries: 10
delay: 10
become_user: fenix
environment:
KUBECONFIG: /home/fenix/.kube/config
- name: Criar IP pool
shell: |
cat <<EOF | kubectl apply -f -
apiVersion: metallb.io/v1beta1
kind: IPAddressPool
metadata:
name: local-pool
namespace: metallb-system
spec:
addresses:
- 10.240.0.100-10.240.0.250
EOF
become_user: fenix
environment:
KUBECONFIG: /home/fenix/.kube/config
- name: Criar anúncio L2
shell: |
cat <<EOF | kubectl apply -f -
apiVersion: metallb.io/v1beta1
kind: L2Advertisement
metadata:
name: advert
namespace: metallb-system
EOF
become_user: fenix
environment:
KUBECONFIG: /home/fenix/.kube/config
- name: Get kubeadm join command
become: true
shell: kubeadm token create --print-join-command

View File

@ -10,7 +10,7 @@ with open("/tmp/kube-flannel.yml", "r") as f:
for doc in docs:
if doc.get("kind") == "ConfigMap" and doc.get("metadata", {}).get("name") == "kube-flannel-cfg":
doc["data"]["net-conf.json"] = '''{
"Network": "10.244.0.0/16",
"Network": "10.240.0.0/16",
"Backend": {
"Type": "vxlan"
},

View File

@ -88,6 +88,7 @@
- kubelet
- kubeadm
- kubectl
- nfs-common
state: present
update_cache: yes
@ -161,3 +162,5 @@
owner: root
group: root
mode: '0644'

View File

@ -0,0 +1,54 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: lazylibrarian
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: lazylibrarian
template:
metadata:
labels:
app: lazylibrarian
spec:
imagePullSecrets:
- name: regcred
containers:
- name: lazylibrarian
image: lscr.io/linuxserver/lazylibrarian:latest
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 5299
name: webui
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
volumeMounts:
- name: config
mountPath: /config
- name: books
mountPath: /books
- name: downloads
mountPath: /downloads
volumes:
- name: config
persistentVolumeClaim:
claimName: lazylibrarian-config-pvc
- name: books
persistentVolumeClaim:
claimName: lazylibrarian-books-pvc
- name: downloads
persistentVolumeClaim:
claimName: qbittorrent-downloads-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: lazylibrarian-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/lazylibrarian
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,60 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: lazylibrarian-config-pv
namespace: stack-arr
spec:
capacity:
storage: 20Gi
storageClassName: lazylibrarian-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/lazylibrarian/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: lazylibrarian-config-pvc
namespace: stack-arr
spec:
storageClassName: lazylibrarian-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: lazylibrarian-config-pv
resources:
requests:
storage: 20Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: lazylibrarian-media-pv
namespace: stack-arr
spec:
capacity:
storage: 150Gi
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series/Livros
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: lazylibrarian-books-pvc
namespace: stack-arr
spec:
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: lazylibrarian-media-pv
resources:
requests:
storage: 150Gi
---

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: lazylibrarian-service
namespace: stack-arr
spec:
ports:
- port: 5299
targetPort: 5299
selector:
app: lazylibrarian
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/lazylibrarian/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/lazylibrarian/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/lazylibrarian/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/lazylibrarian/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.lazylibrarian.secret", dest: "/tmp/stack-arr/lazylibrarian/kubernetes-files/files/lazylibrarian-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/lazylibrarian/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/lazylibrarian/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,26 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: libretranslate
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: libretranslate
template:
metadata:
labels:
app: libretranslate
spec:
containers:
- name: libretranslate
image: libretranslate/libretranslate:latest
ports:
- containerPort: 5000
env:
- name: LT_HTTP_HOST
value: "0.0.0.0"
- name: LT_HTTP_PORT
value: "5000"

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: libretranslate-service
namespace: stack-arr
spec:
ports:
- port: 5000
targetPort: 5000
selector:
app: libretranslate
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/libreTranslate/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/libreTranslate/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/libreTranslate/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/libreTranslate/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.radarr.secret", dest: "/tmp/stack-arr/radarr/kubernetes-files/files/radarr-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/libreTranslate/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/libreTranslate/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,36 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: lingarr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: lingarr
template:
metadata:
labels:
app: lingarr
spec:
containers:
- name: lingarr
image: lingarr/lingarr:latest
ports:
- containerPort: 9876
env:
- name: ASPNETCORE_URLS
value: "http://+:9876"
- name: WHISPER_BASE_URL
value: "http://whisperasr-service.stack-arr.svc.cluster.local:9000"
- name: SOURCE_LANGUAGE
value: "auto"
- name: TARGET_LANGUAGE
value: "pt"
volumeMounts:
- name: config
mountPath: /app/config
volumes:
- name: config
persistentVolumeClaim:
claimName: lingarr-config-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: lingarr-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/lingarr
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,29 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: lingarr-config-pv
namespace: stack-arr
spec:
capacity:
storage: 10Gi
storageClassName: lingarr-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/lingarr/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: lingarr-config-pvc
namespace: stack-arr
spec:
storageClassName: lingarr-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: lingarr-config-pv
resources:
requests:
storage: 10Gi

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: lingarr-service
namespace: stack-arr
spec:
ports:
- port: 9876
targetPort: 9876
selector:
app: lingarr
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/lingarr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/lingarr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/lingarr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/lingarr/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.radarr.secret", dest: "/tmp/stack-arr/radarr/kubernetes-files/files/radarr-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/lingarr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/lingarr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,90 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: mangareader
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: mangareader
template:
metadata:
labels:
app: mangareader
spec:
securityContext:
fsGroup: 1013
imagePullSecrets:
- name: regcred
containers:
- name: mangareader
image: ghcr.io/suwayomi/tachidesk:v2.1.2061
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 4567
name: webui
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
- name: AUTO_DOWNLOAD_CHAPTERS
value: 'true'
- name: AUTO_BACKUP_INCLUDE_MANGA
value: 'false'
- name: AUTO_BACKUP_INCLUDE_CATEGORIES
value: 'false'
- name: AUTO_BACKUP_INCLUDE_CHAPTERS
value: 'false'
- name: AUTO_BACKUP_INCLUDE_TRACKING
value: 'false'
- name: AUTO_BACKUP_INCLUDE_HISTORY
value: 'false'
- name: AUTO_BACKUP_INCLUDE_CLIENT_DATA
value: 'false'
- name: AUTO_BACKUP_INCLUDE_SERVER_SETTINGS
value: 'false'
- name: FLARESOLVERR_ENABLED
value: 'true'
- name: FLARESOLVERR_URL
value: 'http://flaresolverr-service.stack-arr.svc.cluster.local:8191'
- name: DATABASE_TYPE
value: 'POSTGRESQL'
- name: DATABASE_URL
value: 'postgresql://stolon-proxy-service.postgresql.svc.cluster.local:5432/mangareader'
- name: DATABASE_USERNAME
valueFrom:
secretKeyRef:
name: mangareader-secret
key: username
- name: DATABASE_PASSWORD
valueFrom:
secretKeyRef:
name: mangareader-secret
key: password
volumeMounts:
- name: config
mountPath: /home/suwayomi/.local/share/Tachidesk
- name: books
mountPath: /books
- name: downloads
mountPath: /downloads
volumes:
- name: config
persistentVolumeClaim:
claimName: mangareader-config-pvc
- name: books
persistentVolumeClaim:
claimName: mangareader-books-pvc
- name: downloads
persistentVolumeClaim:
claimName: qbittorrent-downloads-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: mangareader-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/mangareader
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,60 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: mangareader-config-pv
namespace: stack-arr
spec:
capacity:
storage: 20Gi
storageClassName: mangareader-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/mangareader/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: mangareader-config-pvc
namespace: stack-arr
spec:
storageClassName: mangareader-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: mangareader-config-pv
resources:
requests:
storage: 20Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: mangareader-media-pv
namespace: stack-arr
spec:
capacity:
storage: 150Gi
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series/Livros
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: mangareader-books-pvc
namespace: stack-arr
spec:
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: mangareader-media-pv
resources:
requests:
storage: 150Gi
---

View File

@ -0,0 +1,9 @@
apiVersion: v1
kind: Secret
metadata:
name: mangareader-secret
namespace: stack-arr
type: Opaque
data:
username: dXNlcm5hbWU=
password: cGFzc3dvcmQ=

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: mangareader-service
namespace: stack-arr
spec:
ports:
- port: 4567
targetPort: 4567
selector:
app: mangareader
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/mangareader/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/mangareader/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/mangareader/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/mangareader/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Obter várias notas do Bitwarden
shell: |
echo "unlock"
BW_SESSION=$(bw unlock {{ bw_password }} --raw)
echo "get item"
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.stackarr.mangareader.secret", dest: "/tmp/stack-arr/mangareader/kubernetes-files/files/mangareader-secret.yaml" }
args:
executable: /bin/bash
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/mangareader/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/mangareader/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,15 @@
apiVersion: v1
kind: ConfigMap
metadata:
name: minecraft-configmap
namespace: minecraft
data:
SERVER_NAME: "Example Minecraft Server"
EULA: "true"
VERSION: "1.21.1"
MAX_PLAYERS: "10"
OPS: |
tomas
ENABLE_WHITELIST: "true"
WHITELIST: |
tomas

View File

@ -0,0 +1,4 @@
apiVersion: v1
kind: Namespace
metadata:
name: minecraft

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: minecraft-nfs-csi
namespace: minecraft
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/Minecraft/TI0
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,29 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: minecraft-config-pv
namespace: minecraft
spec:
capacity:
storage: 30Gi
storageClassName: minecraft-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Minecraft/TI0
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: minecraft-config-pvc
namespace: minecraft
spec:
storageClassName: minecraft-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: minecraft-config-pv
resources:
requests:
storage: 30Gi

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: minecraft-service
namespace: stack-arr
spec:
ports:
- port: 19132
protocol: UDP
selector:
app: minecraft
type: ClusterIP

View File

@ -0,0 +1,46 @@
apiVersion: apps/v1
kind: StatefulSet
metadata:
name: minecraft
namespace: minecraft
spec:
replicas: 1
selector:
matchLabels:
app: minecraft
template:
metadata:
labels:
app: minecraft
spec:
securityContext:
runAsNonRoot: true
runAsUser: 1013
fsGroup: 1013
imagePullSecrets:
- name: regcred
containers:
- name: minecraft
image: itzg/minecraft-server
stdin: true
tty: true
resources:
requests:
cpu: 2
memory: 5Gi
envFrom:
- configMapRef:
name: minecraft-configmap
ports:
- containerPort: 19132
name: serverport
volumeMounts:
- name: data
mountPath: /data
volumes:
- name: data
persistentVolumeClaim:
claimName: minecraft-config-pvc

View File

@ -0,0 +1,52 @@
- name: Remover o diretório /tmp/stack-arr/minecraft/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/minecraft/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/minecraft/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/minecraft/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.minecraft.secret", dest: "/tmp/stack-arr/minecraft/kubernetes-files/files/minecraft-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/minecraft/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/minecraft/kubernetes-files/files/minecraft-namespace.yaml
kubectl apply -f /tmp/stack-arr/minecraft/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,66 @@
- name: Instalar driver NVIDIA
become: yes
ansible.builtin.apt:
name: nvidia-driver-550
state: present
- name: Instalar utilitários NVIDIA
become: yes
ansible.builtin.apt:
name: nvidia-utils-550
state: present
- name: Reboot host e esperar voltar
become: yes
ansible.builtin.reboot:
reboot_timeout: 600 # tempo máximo para o host voltar (segundos)
test_command: whoami # comando usado para validar que o host voltou
- name: Adicionar chave GPG da NVIDIA
become: yes
become_user: fenix
ansible.builtin.shell: |
curl -fsSL https://nvidia.github.io/libnvidia-container/gpgkey | sudo gpg --dearmor -o /usr/share/keyrings/nvidia-container-toolkit.gpg
args:
creates: /usr/share/keyrings/nvidia-container-toolkit.gpg
- name: Adicionar repositório NVIDIA
become: yes
ansible.builtin.shell: |
curl -fsSL https://nvidia.github.io/libnvidia-container/gpgkey | sudo gpg --dearmor -o /usr/share/keyrings/nvidia-container-toolkit-keyring.gpg \
&& curl -s -L https://nvidia.github.io/libnvidia-container/stable/deb/nvidia-container-toolkit.list | \
sed 's#deb https://#deb [signed-by=/usr/share/keyrings/nvidia-container-toolkit-keyring.gpg] https://#g' | \
sudo tee /etc/apt/sources.list.d/nvidia-container-toolkit.list
args:
creates: /etc/apt/sources.list.d/nvidia-container-toolkit.list
- name: Atualizar cache de pacotes
become: yes
ansible.builtin.apt:
update_cache: yes
- name: Instalar NVIDIA Container Toolkit
become: yes
ansible.builtin.apt:
name: nvidia-container-toolkit
state: present
- name: Configurar runtime containerd
become: yes
ansible.builtin.shell: |
nvidia-ctk runtime configure --runtime=containerd
- name: Reiniciar containerd
become: yes
ansible.builtin.systemd:
name: containerd
state: restarted
- name: Mostrar resultado nvidia-smi
become: yes
ansible.builtin.debug:
var: nvidia_smi_output.stdout

View File

@ -0,0 +1,17 @@
apiVersion: v1
kind: ConfigMap
metadata:
name: time-slicing-config-all
namespace: gpu-operator
data:
any: |-
version: v1
flags:
migStrategy: none
sharing:
timeSlicing:
renameByDefault: false
failRequestsGreaterThanOne: false
resources:
- name: nvidia.com/gpu
replicas: 4

View File

@ -0,0 +1,67 @@
- name: Adicionar repositório Helm do nvida gpu
command: >
helm repo add nvidia https://nvidia.github.io/gpu-operator
ignore_errors: yes
- name: Atualizar repositórios Helm
command: helm repo update
- name: Instalar nvida gpu Driver via Helm
command: helm upgrade --install nvidia-operator nvidia/gpu-operator --namespace gpu-operator --create-namespace
register: resultado_nvidia
environment:
KUBECONFIG: /home/fenix/.kube/config
- name: Mostrar resultado do nvida gpu Driver
debug:
var: resultado_nvidia.stdout_lines
- name: Remover o diretório /tmp/nvidia/kubernetes-files
ansible.builtin.file:
path: /tmp/nvidia/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/nvidia/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/nvidia/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/nvidia/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o files
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/nvidia/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config
- name: Aplicar o files
become: yes
become_user: fenix
shell: |
kubectl patch clusterpolicies.nvidia.com/cluster-policy -n gpu-operator --type merge -p "{\"spec\": {\"devicePlugin\": {\"config\": {\"name\": \"time-slicing-config-all\", \"default\": \"any\"}}}}"
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,67 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: prowlarr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: prowlarr
template:
metadata:
labels:
app: prowlarr
spec:
imagePullSecrets:
- name: regcred
containers:
- name: prowlarr
image: lscr.io/linuxserver/prowlarr:2.1.5
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 9696
name: webui
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
- name: PROWLARR__POSTGRES__HOST
value: 'stolon-proxy-service.postgresql.svc.cluster.local'
- name: PROWLARR__POSTGRES__USER
valueFrom:
secretKeyRef:
name: prowlarr-secret
key: username
- name: PROWLARR__POSTGRES__PASSWORD
valueFrom:
secretKeyRef:
name: prowlarr-secret
key: password
- name: PROWLARR__POSTGRES__MAINDB
valueFrom:
secretKeyRef:
name: prowlarr-secret
key: maindb
- name: PROWLARR__POSTGRES__LOGDB
valueFrom:
secretKeyRef:
name: prowlarr-secret
key: logsdb
volumeMounts:
- name: config
mountPath: /config
volumes:
- name: config
persistentVolumeClaim:
claimName: prowlarr-config-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: prowlarr-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/prowlarr
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,30 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: prowlarr-config-pv
namespace: stack-arr
spec:
capacity:
storage: 2Gi
storageClassName: prowlarr-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/prowlarr/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: prowlarr-config-pvc
namespace: stack-arr
spec:
storageClassName: prowlarr-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: prowlarr-config-pv
resources:
requests:
storage: 2Gi
---

View File

@ -0,0 +1,11 @@
apiVersion: v1
kind: Secret
metadata:
name: prowlarr-secret
namespace: stack-arr
type: Opaque
data:
username: dXNlcm5hbWU=
password: cGFzc3dvcmQ=
maindb: bWFpbmRiLXByb3dsYXJy
logsdb: bG9nZGItcHJvd2xhcnI=

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: prowlarr-service
namespace: stack-arr
spec:
ports:
- port: 9696
targetPort: 9696
selector:
app: prowlarr
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/prowlarr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/prowlarr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/prowlarr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/prowlarr/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Obter várias notas do Bitwarden
shell: |
echo "unlock"
BW_SESSION=$(bw unlock {{ bw_password }} --raw)
echo "get item"
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.stackarr.prowlarr.secret", dest: "/tmp/stack-arr/prowlarr/kubernetes-files/files/prowlarr-secret.yaml" }
args:
executable: /bin/bash
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/prowlarr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/prowlarr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,9 @@
apiVersion: v1
kind: Secret
metadata:
name: regcred
namespace: stack-arr
data:
.dockerconfigjson: >-
eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJ1c2VyIiwicGFzc3dvcmQiOiJwYXNzIiwiYXV0aCI6ImRmamlla2ZlcldFS1dFa29mY2RrbzM0MzUzZmQ9In19fQ==
type: kubernetes.io/dockerconfigjson

Some files were not shown because too many files have changed in this diff Show More