Compare commits

...

114 Commits

Author SHA1 Message Date
ff0f048859 radarr call 2025-11-13 22:30:09 +00:00
78659b1c77 radarr 2025-11-13 22:29:04 +00:00
32ef4ccb0d decluttarr readme 2025-11-13 20:38:59 +00:00
b509854496 decluttarr 2025-11-13 19:17:24 +00:00
c51a7d81be decluttarr 2025-11-13 17:34:15 +00:00
b053fc8019 sonarr animes folder 2025-11-13 15:49:39 +00:00
0cb3784757 jellyseerr 2025-11-13 13:30:09 +00:00
2115a8aa61 Update README.md 2025-11-13 13:04:50 +00:00
076cb81c9d flaresolverr 2025-11-13 13:02:08 +00:00
bdafea0784 flaresolverr 2025-11-13 13:01:39 +00:00
3b5d59a589 Merge branch 'main' of https://gitea.fenix-dev.com/fenix-gitea-admin/iac-ansible-private 2025-11-12 20:14:49 +00:00
3c07b1b998 jellyfin 2025-11-12 20:14:43 +00:00
dbbcc45525 Update roles/stolon/tasks/main.yml 2025-11-12 17:30:06 +00:00
d3981868cf run cloudflare 2025-11-12 17:19:18 +00:00
6c78b7ce39 cloudflare 2025-11-12 17:18:40 +00:00
ebd772665b Update roles/stolon/tasks/main.yml 2025-11-12 16:05:29 +00:00
21d91805ad sonarr added 2025-11-12 14:39:00 +00:00
c00cd6a94f prowlar service 2025-11-12 12:55:35 +00:00
a34e5a5e8b Update roles/stolon/tasks/main.yml 2025-11-11 22:44:50 +00:00
71ec9945b1 prowlarr call 2025-11-11 21:57:18 +00:00
11dbff9b8a added prowlarr 2025-11-11 21:47:46 +00:00
fecbc54b79 qbit service and documentation 2025-11-11 19:44:44 +00:00
d693a947f2 Merge branch 'main' of https://gitea.fenix-dev.com/fenix-gitea-admin/iac-ansible-private 2025-11-11 19:15:13 +00:00
8c882adffe new qbittorrent image 2025-11-11 19:14:35 +00:00
fff458af5a Update roles/qbittorrent/files/qbittorrent-deployment.yaml 2025-11-11 17:43:12 +00:00
de1925a486 Update roles/qbittorrent/tasks/main.yml 2025-11-11 17:34:05 +00:00
2fdee619ca Merge branch 'main' of https://gitea.fenix-dev.com/fenix-gitea-admin/iac-ansible-private 2025-11-11 16:06:28 +00:00
47411136d0 role changing position 2025-11-11 16:06:20 +00:00
08a0bb3761 Update playbook.yml 2025-11-11 15:59:58 +00:00
27b924b558 bittorrent 2025-11-11 15:48:09 +00:00
d460624689 Update roles/stolon/tasks/main.yml 2025-11-10 23:30:03 +00:00
676cc04dd4 Merge branch 'main' of https://gitea.fenix-dev.com/fenix-gitea-admin/iac-ansible-private 2025-11-10 23:13:41 +00:00
e62baff9e7 stolon 2025-11-10 23:13:36 +00:00
f532ff4507 Update roles/kubernetes/tasks/main.yml 2025-11-10 13:06:53 +00:00
dd420b851c a 2025-11-09 19:51:10 +00:00
07698ad8a3 Merge branch 'main' of https://gitea.fenix-dev.com/fenix-gitea-admin/iac-ansible-private 2025-11-09 14:12:56 +00:00
b981b12635 fsgroup 2025-11-09 14:12:46 +00:00
5441e7852e Update roles/kube-master/tasks/main.yml 2025-11-07 16:17:41 +00:00
5df04be859 Update roles/kube-master/tasks/main.yml 2025-11-07 15:23:44 +00:00
baa06e11d3 Update roles/kube-master/tasks/main.yml 2025-11-07 14:53:52 +00:00
3afed3f5bd Update roles/kube-master/tasks/main.yml 2025-11-07 14:36:21 +00:00
5d82af3236 Update roles/kube-master/tasks/main.yml 2025-11-07 12:03:49 +00:00
946621ae59 Update roles/kube-master/tasks/main.yml 2025-11-07 11:58:32 +00:00
d6d5a94fd1 Update roles/stolon/tasks/main.yml 2025-11-07 11:29:39 +00:00
d47040565a Update roles/stolon/tasks/main.yml 2025-11-06 21:49:25 +00:00
a794dcd037 Update roles/stolon/tasks/main.yml 2025-11-06 21:38:24 +00:00
fee0b08777 Update roles/stolon/tasks/main.yml 2025-11-06 21:33:23 +00:00
d047d1da32 Update roles/stolon/tasks/main.yml 2025-11-06 21:31:08 +00:00
0d93657131 Update roles/stolon/tasks/main.yml 2025-11-06 21:11:20 +00:00
1b1d683d38 Update roles/kube-master/tasks/main.yml 2025-11-06 20:30:04 +00:00
2bca89aa2d Update roles/kube-master/tasks/main.yml 2025-11-06 20:19:52 +00:00
e2450e477a Update roles/kube-master/tasks/main.yml 2025-11-06 15:16:57 +00:00
4be17277b9 Update roles/kube-master/tasks/patch_netconf.py 2025-11-06 14:41:55 +00:00
f45445443f Update roles/kube-master/tasks/main.yml 2025-11-06 14:12:25 +00:00
9e50c6c110 Update roles/kube-master/tasks/main.yml 2025-11-05 15:07:47 +00:00
1e20c82f27 Update roles/kube-master/tasks/main.yml 2025-11-05 14:03:16 +00:00
adcbcca46c Update roles/kube-master/tasks/main.yml 2025-11-03 20:53:27 +00:00
91355e6724 Update roles/kube-master/tasks/main.yml 2025-11-03 20:12:47 +00:00
3d2d3278f3 Update roles/stolon/files/stolon-proxy-service.yaml 2025-11-03 17:24:38 +00:00
ab1769f830 Update roles/stolon/tasks/main.yml 2025-10-30 22:19:10 +00:00
91ded9edd2 export not 2025-10-30 21:09:30 +00:00
460a1e07a3 vars bw to stolon 2025-10-30 21:02:15 +00:00
5fab44c939 bw on stolon 2025-10-30 20:55:00 +00:00
46994b5cc7 Update roles/vaultwarden/tasks/main.yml 2025-10-30 20:48:00 +00:00
6dcc0640b6 Update roles/vaultwarden/tasks/main.yml 2025-10-30 20:29:28 +00:00
20e6e518a4 Update .gitea/workflows/deploy-k8s.yml 2025-10-30 20:24:42 +00:00
99f42d7223 Update roles/vaultwarden/tasks/main.yml 2025-10-30 20:24:02 +00:00
d9d8a41574 Update roles/vaultwarden/tasks/main.yml 2025-10-30 20:19:04 +00:00
2e3fe12b16 Update roles/vaultwarden/tasks/main.yml 2025-10-30 20:14:38 +00:00
bd480ae5cf Update roles/vaultwarden/tasks/main.yml 2025-10-30 20:00:53 +00:00
564a9b028c Update .gitea/workflows/deploy-k8s.yml 2025-10-30 20:00:09 +00:00
ae076fd98a Update roles/vaultwarden/tasks/main.yml 2025-10-30 19:51:56 +00:00
5ce25f0267 Update .gitea/workflows/deploy-k8s.yml 2025-10-30 19:50:33 +00:00
5bb538322b Update .gitea/workflows/deploy-k8s.yml 2025-10-30 19:43:35 +00:00
f34763271e Update roles/vaultwarden/tasks/main.yml 2025-10-30 17:44:19 +00:00
1456906d65 Update roles/vaultwarden/vars/main.yml 2025-10-30 17:38:53 +00:00
87e269c4b0 Update roles/vaultwarden/tasks/main.yml 2025-10-30 17:37:50 +00:00
b172e24a0e Update roles/vaultwarden/vars/main.yml 2025-10-30 17:24:10 +00:00
c850375dd4 Update roles/vaultwarden/tasks/main.yml 2025-10-30 17:22:46 +00:00
9e7f5be196 Update roles/vaultwarden/tasks/main.yml 2025-10-30 17:04:56 +00:00
e64863f887 nodejs 20 2025-10-30 13:47:09 +00:00
c0a8b0b00a bw via npm 2025-10-30 13:40:17 +00:00
2b060b27f0 bw 2025-10-30 13:33:00 +00:00
895dacd28d Update roles/stolon/tasks/main.yml 2025-10-30 13:14:08 +00:00
d5ed666c77 Update roles/stolon/tasks/main.yml 2025-10-30 12:46:22 +00:00
6b864989f5 Update .gitea/workflows/deploy-k8s.yml 2025-10-30 12:30:26 +00:00
b4b99298e7 Update .gitea/workflows/deploy-k8s.yml 2025-10-30 12:27:16 +00:00
077ac6f39b Update roles/stolon/tasks/main.yml 2025-10-30 09:49:29 +00:00
35a95c6553 Update roles/stolon/files/stolon-nfs-csi.yaml 2025-10-30 09:44:52 +00:00
aa55c290e1 Update roles/kube-master/tasks/main.yml 2025-10-30 09:29:51 +00:00
e2c0cb640c Update roles/stolon/tasks/main.yml 2025-10-30 09:25:02 +00:00
6b0bbff17c Update roles/stolon/files/stolon-nfs-csi.yaml 2025-10-30 09:12:52 +00:00
7c2908bea6 Update roles/stolon/files/stolon-nfs-csi.yaml 2025-10-30 09:11:43 +00:00
d79c611824 Update roles/kube-master/tasks/main.yml 2025-10-29 21:17:38 +00:00
b4ee6d1b83 Update roles/kube-master/tasks/main.yml 2025-10-29 20:59:35 +00:00
b774664389 Update roles/kube-master/tasks/main.yml 2025-10-29 20:51:25 +00:00
fd63bc9f0e Update roles/kube-master/tasks/main.yml 2025-10-29 20:30:38 +00:00
e8e9fa2d01 Update roles/kube-master/tasks/main.yml 2025-10-29 20:17:32 +00:00
928c6b2445 Update roles/kube-master/tasks/main.yml 2025-10-29 20:11:07 +00:00
dc2f6b163c Update roles/kube-master/tasks/main.yml 2025-10-29 20:01:11 +00:00
2f2d3c621b Update roles/kube-master/tasks/main.yml 2025-10-29 14:39:04 +00:00
e057170f9c namespace 2025-10-29 13:56:32 +00:00
db1d69e566 Update roles/stolon/tasks/main.yml 2025-10-29 13:51:04 +00:00
138e0e5b8d a 2025-10-29 13:46:32 +00:00
fe48f35c87 Update roles/stolon/tasks/main.yml 2025-10-29 13:36:27 +00:00
e295c09152 Update roles/stolon/tasks/main.yml 2025-10-29 13:24:18 +00:00
814abb92dd [deploy-opentofu] 2025-10-29 13:18:01 +00:00
983167e8bc yaml format 2025-10-29 13:16:03 +00:00
a142e3acda Update roles/stolon/kubernetes-files/stolon-proxy-service.yaml 2025-10-29 13:14:20 +00:00
2eaea3dbb3 Update roles/stolon/tasks/main.yml 2025-10-28 09:05:36 +00:00
db87c453ce teste com secrets falsos 2025-10-28 09:00:53 +00:00
5d60378c35 Merge branch 'main' of https://gitea.fenix-dev.com/fenix-gitea-admin/iac-ansible-private 2025-10-25 16:05:15 +01:00
892b80c438 vaultwarden test 2025-10-25 16:04:58 +01:00
39dd5e0c72 Update playbook.yml 2025-10-25 14:56:49 +00:00
80 changed files with 2451 additions and 7 deletions

View File

@ -35,7 +35,7 @@ jobs:
bw login --apikey
echo "session"
BW_SESSION=$(bw unlock "$BW_PASSWORD" --raw)
echo "BW_SESSION=$BW_SESSION" >> $GITEA_ENV
- name: Cloning ansible repository
uses: actions/checkout@v4
@ -55,4 +55,6 @@ jobs:
- name: Run Ansible Playbook
working-directory: ansible/iac
run: |
ansible-playbook -i inventory.ini playbook.yml
ansible-playbook -i inventory.ini playbook.yml -e "BW_CLIENTID=$BW_CLIENTID BW_CLIENTSECRET=$BW_CLIENTSECRET BW_PASSWORD=$BW_PASSWORD BW_EMAIL=$BW_EMAIL"
env:
BW_SESSION: ${{ env.BW_SESSION }}

View File

@ -1,3 +1,15 @@
# iac-ansible-private
iac-ansible-private
stolon comes from https://github.com/sorintlab/stolon/blob/master/examples/kubernetes/README.md
qbittorrent comes from https://github.com/j4ym0/pia-qbittorrent-docker?tab=readme-ov-file
prowlarr comes from https://docs.linuxserver.io/images/docker-prowlarr/#docker-mods
and https://wiki.servarr.com/prowlarr/environment-variables
sonarr comes from https://wiki.servarr.com/sonarr/environment-variables
and https://docs.linuxserver.io/images/docker-sonarr/#supported-architectures
jellyfin comes from https://docs.linuxserver.io/images/docker-jellyfin/
flaresolverr comes from https://github.com/FlareSolverr/FlareSolverr
jellyseer comes from https://hub.docker.com/r/fallenbagel/jellyseerr
and https://docs.seerr.dev/extending-jellyseerr/database-config
decluttarr comes from https://github.com/ManiMatter/decluttarr

View File

@ -3,6 +3,7 @@
become: yes
roles:
- common
- vaultwarden
- kubernetes
- kube-master
@ -11,5 +12,21 @@
become: yes
roles:
- common
- vaultwarden
- kubernetes
- kube-node
- name: Configure Kubernetes Data
hosts: master
become: yes
roles:
- stolon
- cloudflared
- qbittorrent
- prowlarr
- sonarr
- radarr
- jellyfin
- flaresolverr
- jellyseerr
- decluttarr

View File

@ -0,0 +1,4 @@
apiVersion: v1
kind: Namespace
metadata:
name: cloudflare

View File

@ -0,0 +1,49 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: cloudflared-tunnel
namespace: cloudflare
spec:
replicas: 3
selector:
matchLabels:
app: cloudflared
template:
metadata:
labels:
app: cloudflared
spec:
securityContext:
sysctls:
# Allows ICMP traffic (ping, traceroute) to resources behind cloudflared.
- name: net.ipv4.ping_group_range
value: "65532 65532"
containers:
- image: cloudflare/cloudflared:latest
name: cloudflared
env:
# Defines an environment variable for the tunnel token.
- name: TUNNEL_TOKEN
valueFrom:
secretKeyRef:
name: tunnel-token-secret
key: token
command:
# Configures tunnel run parameters
- cloudflared
- tunnel
- --no-autoupdate
- --loglevel
- debug
- --metrics
- 0.0.0.0:2000
- run
livenessProbe:
httpGet:
# Cloudflared has a /ready endpoint which returns 200 if and only if
# it has an active connection to Cloudflare's network.
path: /ready
port: 2000
failureThreshold: 1
initialDelaySeconds: 10
periodSeconds: 10

View File

@ -0,0 +1,8 @@
apiVersion: v1
kind: Secret
metadata:
name: tunnel-token-secret
namespace: cloudflare
type: Opaque
data:
token: <CLOUDFLARE_TUNNEL_TOKEN>

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/cloudflare/kubernetes-files
ansible.builtin.file:
path: /tmp/cloudflare/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/cloudflare/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/cloudflare/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Obter várias notas do Bitwarden
shell: |
echo "unlock"
BW_SESSION=$(bw unlock {{ bw_password }} --raw)
echo "get item"
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.cloudflare.tunnel.secret", dest: "/tmp/cloudflare/kubernetes-files/files/tunnel-token-secret.yaml" }
args:
executable: /bin/bash
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/cloudflare/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/cloudflare/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,74 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: decluttarr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: decluttarr
template:
metadata:
labels:
app: decluttarr
spec:
imagePullSecrets:
- name: regcred
containers:
- name: decluttarr
image: ghcr.io/manimatter/decluttarr:latest
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
- name: REMOVE_TIMER
value: '1'
- name: REMOVE_FAILED
value: 'True'
- name: REMOVE_FAILED_IMPORTS
value: 'True'
- name: REMOVE_METADATA_MISSING
value: 'True'
- name: REMOVE_MISSING_FILES
value: 'True'
- name: REMOVE_ORPHANS
value: 'True'
- name: REMOVE_SLOW
value: 'False'
- name: REMOVE_STALLED
value: 'True'
- name: REMOVE_UNMONITORED
value: 'False'
- name: MIN_DOWNLOAD_SPEED
value: '100'
- name: PERMITTED_ATTEMPTS
value: '2'
- name: SONARR
valueFrom:
secretKeyRef:
name: decluttarr-secret
key: sonarr
- name: QBITTORRENT
valueFrom:
secretKeyRef:
name: decluttarr-secret
key: bittorrent
volumeMounts:
- name: config
mountPath: /config
- name: downloads
mountPath: /data/downloads
volumes:
- name: config
persistentVolumeClaim:
claimName: decluttarr-config-pvc
- name: downloads
persistentVolumeClaim:
claimName: qbittorrent-downloads-pvc

View File

@ -0,0 +1,12 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: decluttarr-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/decluttarr
allowVolumeExpansion: true
reclaimPolicy: Retain
---

View File

@ -0,0 +1,30 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: decluttarr-config-pv
namespace: stack-arr
spec:
capacity:
storage: 2Gi
storageClassName: decluttarr-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/decluttarr/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: decluttarr-config-pvc
namespace: stack-arr
spec:
storageClassName: decluttarr-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: decluttarr-config-pv
resources:
requests:
storage: 2Gi
---

View File

@ -0,0 +1,10 @@
apiVersion: v1
kind: Secret
metadata:
name: decluttarr-secret
namespace: stack-arr
type: Opaque
data:
radarr: IC0gYmFzZV91cmw6ICJodHRwOi8vcmFkYXJyOjc4NzgiCiAgIGFwaV9rZXk6ICJSQURBUlJfQVBJX0tFWSI=
sonarr: IC0gYmFzZV91cmw6ICJodHRwOi8vc29uYXJyMTo4OTg5IgogICBhcGlfa2V5OiAiU09OQVJSX0FQSV9LRVki
bittorrent: LSBiYXNlX3VybDogImh0dHA6Ly9xYml0dG9ycmVudC1zZXJ2aWNlLnN0YWNrLWFyci5zdmMuY2x1c3Rlci5sb2NhbDo4MDgwIgogIHVzZXJuYW1lOiAidXNlciIgCiAgcGFzc3dvcmQ6ICJwYXNzIgogIG5hbWU6ICJxQml0dG9ycmVudCIKICAgICAgICA=

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/decluttarr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/decluttarr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/decluttarr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/decluttarr/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Obter várias notas do Bitwarden
shell: |
echo "unlock"
BW_SESSION=$(bw unlock {{ bw_password }} --raw)
echo "get item"
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.stackarr.decluttarr.secret", dest: "/tmp/stack-arr/decluttarr/kubernetes-files/files/decluttarr-secret.yaml" }
args:
executable: /bin/bash
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/decluttarr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/decluttarr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,32 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: flaresolverr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: flaresolverr
template:
metadata:
labels:
app: flaresolverr
spec:
imagePullSecrets:
- name: regcred
containers:
- name: flaresolverr
image: ghcr.io/flaresolverr/flaresolverr:latest
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 8191
name: porta
env:
- name: LOG_LEVEL
value: "info"

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: flaresolverr-service
namespace: stack-arr
spec:
ports:
- port: 8191
targetPort: 8191
selector:
app: flaresolverr
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/sonarr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/sonarr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/sonarr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/sonarr/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.sonarr.secret", dest: "/tmp/stack-arr/sonarr/kubernetes-files/files/sonarr-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/sonarr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/sonarr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,56 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: jellyfin
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: jellyfin
template:
metadata:
labels:
app: jellyfin
spec:
imagePullSecrets:
- name: regcred
containers:
- name: jellyfin
image: lscr.io/linuxserver/jellyfin:10.11.2
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 8096
name: webui
- containerPort: 8920
name: webuihttps
- containerPort: 1900
name: dlnaudp
- containerPort: 7359
name: discoveryudp
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
volumeMounts:
- name: config
mountPath: /config
- name: videos
mountPath: /videos
volumes:
- name: config
persistentVolumeClaim:
claimName: jellyfin-config-pvc
- name: videos
persistentVolumeClaim:
claimName: jellyfin-videos-pvc

View File

@ -0,0 +1,23 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: jellyfin-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/jellyfin
allowVolumeExpansion: true
reclaimPolicy: Retain
---
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: jellyfin-videos-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,60 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: jellyfin-config-pv
namespace: stack-arr
spec:
capacity:
storage: 2Gi
storageClassName: jellyfin-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/jellyfin/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: jellyfin-config-pvc
namespace: stack-arr
spec:
storageClassName: jellyfin-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: jellyfin-config-pv
resources:
requests:
storage: 2Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: jellyfin-videos-pv
namespace: stack-arr
spec:
capacity:
storage: 150Gi
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: jellyfin-videos-pvc
namespace: stack-arr
spec:
storageClassName: jellyfin-videos-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: jellyfin-videos-pv
resources:
requests:
storage: 150Gi
---

View File

@ -0,0 +1,22 @@
apiVersion: v1
kind: Service
metadata:
name: jellyfin-service
namespace: stack-arr
spec:
ports:
- port: 8096
targetPort: 8096
name: webui
- port: 8920
targetPort: 8920
name: webuihttps
- port: 1900
targetPort: 1900
name: dlnaudp
- port: 7359
targetPort: 7359
name: discoveryudp
selector:
app: jellyfin
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/jellyfin/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/jellyfin/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/jellyfin/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/jellyfin/kubernetes-files
owner: fenix
group: root
mode: '0644'
#- name: Obter várias notas do Bitwarden
# shell: |
# echo "unlock"
# BW_SESSION=$(bw unlock {{ bw_password }} --raw)
# echo "get item"
# bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
# loop:
# - { id: "iac.ansible.stackarr.jellyfin.secret", dest: "/tmp/stack-arr/jellyfin/kubernetes-files/files/jelly-secret.yaml" }
# args:
# executable: /bin/bash
# environment:
# BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/jellyfin/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/jellyfin/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,62 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: jellyseerr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: jellyseerr
template:
metadata:
labels:
app: jellyseerr
spec:
imagePullSecrets:
- name: regcred
containers:
- name: jellyseerr
image: fallenbagel/jellyseerr:2.7.3
ports:
- containerPort: 5055
name: webui
env:
- name: TZ
value: 'Etc/UTC'
- name: LOG_LEVEL
value: 'debug'
- name: DB_TYPE
value: 'postgres'
- name: DB_HOST
value: 'stolon-proxy-service.postgresql.svc.cluster.local'
- name: DB_PORT
value: '5432'
- name: DB_USER
valueFrom:
secretKeyRef:
name: jellyseerr-secret
key: username
- name: DB_PASS
valueFrom:
secretKeyRef:
name: jellyseerr-secret
key: password
- name: DB_NAME
valueFrom:
secretKeyRef:
name: jellyseerr-secret
key: maindb
- name: DB_LOG_QUERIES
value: 'false'
volumeMounts:
- name: config
mountPath: /app/config
volumes:
- name: config
persistentVolumeClaim:
claimName: jellyseerr-config-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: jellyseerr-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/jellyseerr
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,30 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: jellyseerr-config-pv
namespace: stack-arr
spec:
capacity:
storage: 2Gi
storageClassName: jellyseerr-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/jellyseerr/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: jellyseerr-config-pvc
namespace: stack-arr
spec:
storageClassName: jellyseerr-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: jellyseerr-config-pv
resources:
requests:
storage: 2Gi
---

View File

@ -0,0 +1,10 @@
apiVersion: v1
kind: Secret
metadata:
name: jellyseerr-secret
namespace: stack-arr
type: Opaque
data:
username: dXNlcm5hbWU=
password: cGFzc3dvcmQ=
maindb: bWFpbmRiLXByb3dsYXJy

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: jellyseerr-service
namespace: stack-arr
spec:
ports:
- port: 5055
targetPort: 5055
selector:
app: jellyseerr
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/jellyseerr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/jellyseerr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/jellyseerr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/jellyseerr/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Obter várias notas do Bitwarden
shell: |
echo "unlock"
BW_SESSION=$(bw unlock {{ bw_password }} --raw)
echo "get item"
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.stackarr.jellyseerr.secret", dest: "/tmp/stack-arr/jellyseerr/kubernetes-files/files/jellyseerr-secret.yaml" }
args:
executable: /bin/bash
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/jellyseerr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/jellyseerr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -22,7 +22,7 @@
replace:
path: /tmp/kube-flannel.yml
regexp: '10\.244\.0\.0/16'
replace: '10.244.0.0/16' # .3.
replace: '10.240.0.0/16' # .3.
- name: Corrigir net-conf.json no manifest do Flannel
become: true
@ -55,8 +55,9 @@
argv:
- kubeadm
- init
- --pod-network-cidr=10.244.0.0/16 # .3.
- --apiserver-advertise-address=192.168.1.150
- --pod-network-cidr=10.240.0.0/16 # .3.
- --apiserver-advertise-address=192.168.1.50
- --service-cidr=10.95.0.0/16
creates: /etc/kubernetes/admin.conf
@ -102,6 +103,37 @@
delay: 6
become: yes
- name: kubernetes untaint node-role.kubernetes.io/control-plane:NoSchedule
become: true
shell: |
kubectl taint nodes --all node-role.kubernetes.io/control-plane:NoSchedule-
become_user: fenix
environment:
KUBECONFIG: /home/fenix/.kube/config
ignore_errors: yes
- name: kubernetes unlabel node-role.kubernetes.io/control-plane
become: true
shell: |
kubectl label nodes --all node-role.kubernetes.io/control-plane-
become_user: fenix
environment:
KUBECONFIG: /home/fenix/.kube/config
ignore_errors: yes
- name: kubernetes unlabel node.kubernetes.io/exclude-from-external-load-balancers
become: true
shell: |
kubectl label nodes --all node.kubernetes.io/exclude-from-external-load-balancers-
become_user: fenix
environment:
KUBECONFIG: /home/fenix/.kube/config
ignore_errors: yes
- name: cat flannel
become: true
shell: |
@ -133,6 +165,81 @@
delay: 6
become: yes
- name: Instalar Helm no nó master
become: true
shell: |
curl -fsSL https://raw.githubusercontent.com/helm/helm/master/scripts/get-helm-3 | bash
args:
creates: /usr/local/bin/helm
- name: Adicionar repositório Helm do CSI NFS
command: >
helm repo add csi-driver-nfs https://raw.githubusercontent.com/kubernetes-csi/csi-driver-nfs/master/charts
args:
creates: /root/.cache/helm/repository/csi-driver-nfs-index.yaml
- name: Atualizar repositórios Helm
command: helm repo update
- name: Instalar CSI NFS Driver via Helm
command: helm upgrade --install csi-driver-nfs csi-driver-nfs/csi-driver-nfs --namespace kube-system --version 4.12.0
register: resultado_nfs
environment:
KUBECONFIG: /home/fenix/.kube/config
- name: Mostrar resultado do nfs csi driver
debug:
var: resultado_nfs.stdout_lines
- name: Instalar MetalLB (manifest oficial)
shell: kubectl apply -f https://raw.githubusercontent.com/metallb/metallb/v0.13.9/config/manifests/metallb-native.yaml
become_user: fenix
environment:
KUBECONFIG: /home/fenix/.kube/config
- name: Esperar pelo webhook do MetalLB
shell: kubectl get endpoints webhook-service -n metallb-system -o jsonpath='{.subsets[*].addresses[*].ip}'
register: webhook_ready
until: webhook_ready.stdout != ""
retries: 10
delay: 10
become_user: fenix
environment:
KUBECONFIG: /home/fenix/.kube/config
- name: Criar IP pool
shell: |
cat <<EOF | kubectl apply -f -
apiVersion: metallb.io/v1beta1
kind: IPAddressPool
metadata:
name: local-pool
namespace: metallb-system
spec:
addresses:
- 10.240.0.100-10.240.0.250
EOF
become_user: fenix
environment:
KUBECONFIG: /home/fenix/.kube/config
- name: Criar anúncio L2
shell: |
cat <<EOF | kubectl apply -f -
apiVersion: metallb.io/v1beta1
kind: L2Advertisement
metadata:
name: advert
namespace: metallb-system
EOF
become_user: fenix
environment:
KUBECONFIG: /home/fenix/.kube/config
- name: Get kubeadm join command
become: true
shell: kubeadm token create --print-join-command

View File

@ -10,7 +10,7 @@ with open("/tmp/kube-flannel.yml", "r") as f:
for doc in docs:
if doc.get("kind") == "ConfigMap" and doc.get("metadata", {}).get("name") == "kube-flannel-cfg":
doc["data"]["net-conf.json"] = '''{
"Network": "10.244.0.0/16",
"Network": "10.240.0.0/16",
"Backend": {
"Type": "vxlan"
},

View File

@ -88,6 +88,7 @@
- kubelet
- kubeadm
- kubectl
- nfs-common
state: present
update_cache: yes
@ -161,3 +162,5 @@
owner: root
group: root
mode: '0644'

View File

@ -0,0 +1,67 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: prowlarr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: prowlarr
template:
metadata:
labels:
app: prowlarr
spec:
imagePullSecrets:
- name: regcred
containers:
- name: prowlarr
image: lscr.io/linuxserver/prowlarr:2.1.5
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 9696
name: webui
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
- name: PROWLARR__POSTGRES__HOST
value: 'stolon-proxy-service.postgresql.svc.cluster.local'
- name: PROWLARR__POSTGRES__USER
valueFrom:
secretKeyRef:
name: prowlarr-secret
key: username
- name: PROWLARR__POSTGRES__PASSWORD
valueFrom:
secretKeyRef:
name: prowlarr-secret
key: password
- name: PROWLARR__POSTGRES__MAINDB
valueFrom:
secretKeyRef:
name: prowlarr-secret
key: maindb
- name: PROWLARR__POSTGRES__LOGDB
valueFrom:
secretKeyRef:
name: prowlarr-secret
key: logsdb
volumeMounts:
- name: config
mountPath: /config
volumes:
- name: config
persistentVolumeClaim:
claimName: prowlarr-config-pvc

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: prowlarr-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/prowlarr
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,30 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: prowlarr-config-pv
namespace: stack-arr
spec:
capacity:
storage: 2Gi
storageClassName: prowlarr-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/prowlarr/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: prowlarr-config-pvc
namespace: stack-arr
spec:
storageClassName: prowlarr-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: prowlarr-config-pv
resources:
requests:
storage: 2Gi
---

View File

@ -0,0 +1,11 @@
apiVersion: v1
kind: Secret
metadata:
name: prowlarr-secret
namespace: stack-arr
type: Opaque
data:
username: dXNlcm5hbWU=
password: cGFzc3dvcmQ=
maindb: bWFpbmRiLXByb3dsYXJy
logsdb: bG9nZGItcHJvd2xhcnI=

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: prowlarr-service
namespace: stack-arr
spec:
ports:
- port: 9696
targetPort: 9696
selector:
app: prowlarr
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/prowlarr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/prowlarr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/prowlarr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/prowlarr/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Obter várias notas do Bitwarden
shell: |
echo "unlock"
BW_SESSION=$(bw unlock {{ bw_password }} --raw)
echo "get item"
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.stackarr.prowlarr.secret", dest: "/tmp/stack-arr/prowlarr/kubernetes-files/files/prowlarr-secret.yaml" }
args:
executable: /bin/bash
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/prowlarr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/prowlarr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,9 @@
apiVersion: v1
kind: Secret
metadata:
name: regcred
namespace: stack-arr
data:
.dockerconfigjson: >-
eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJ1c2VyIiwicGFzc3dvcmQiOiJwYXNzIiwiYXV0aCI6ImRmamlla2ZlcldFS1dFa29mY2RrbzM0MzUzZmQ9In19fQ==
type: kubernetes.io/dockerconfigjson

View File

@ -0,0 +1,67 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: qbittorrentvpn
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: qbittorrentvpn
template:
metadata:
labels:
app: qbittorrentvpn
spec:
imagePullSecrets:
- name: regcred
containers:
- name: qbittorrentvpn
image: j4ym0/pia-qbittorrent:5.1.2-ubuntu
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 8080
name: webui
- containerPort: 51413
name: torrent-tcp
- containerPort: 51413
name: torrent-udp
protocol: UDP
env:
- name: USER
valueFrom:
secretKeyRef:
name: vpn-secret
key: username
- name: PASSWORD
valueFrom:
secretKeyRef:
name: vpn-secret
key: password
- name: REGION
value: "us_east" # ou outro servidor PIA
- name: WEBUI_PORT
value: "8080"
- name: DNS_SERVERS
value: "1.1.1.1,1.0.0.1"
- name: UID
value: "1013"
- name: GID
value: "1013"
- name: HOSTHEADERVALIDATION
value: 'false'
volumeMounts:
- name: config
mountPath: /config
- name: downloads
mountPath: /downloads
volumes:
- name: config
persistentVolumeClaim:
claimName: qbittorrent-config-pvc
- name: downloads
persistentVolumeClaim:
claimName: qbittorrent-downloads-pvc

View File

@ -0,0 +1,4 @@
apiVersion: v1
kind: Namespace
metadata:
name: stack-arr

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: qbittorrent-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/bittorrent
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,60 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: qbittorrent-config-pv
namespace: stack-arr
spec:
capacity:
storage: 2Gi
storageClassName: qbittorrent-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/bittorrent/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: qbittorrent-config-pvc
namespace: stack-arr
spec:
storageClassName: qbittorrent-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: qbittorrent-config-pv
resources:
requests:
storage: 2Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: qbittorrent-downloads-pv
namespace: stack-arr
spec:
capacity:
storage: 10Gi
storageClassName: qbittorrent-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/bittorrent/downloads
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: qbittorrent-downloads-pvc
namespace: stack-arr
spec:
storageClassName: qbittorrent-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: qbittorrent-downloads-pv
resources:
requests:
storage: 10Gi
---

View File

@ -0,0 +1,13 @@
apiVersion: v1
kind: Service
metadata:
name: qbittorrent-service
namespace: stack-arr
spec:
ports:
- port: 8080
targetPort: 8080
selector:
app: qbittorrentvpn
type: LoadBalancer
loadBalancerIP: 10.240.0.101

View File

@ -0,0 +1,9 @@
apiVersion: v1
kind: Secret
metadata:
name: vpn-secret
namespace: stack-arr
type: Opaque
data:
username: dXNlcm5hbWU=
password: cGFzc3dvcmQ=

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/qbittorrent/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/qbittorrent/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/qbittorrent/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/qbittorrent/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Obter várias notas do Bitwarden
shell: |
echo "unlock"
BW_SESSION=$(bw unlock {{ bw_password }} --raw)
echo "get item"
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.stackarr.qbittorrent.dockersecrets", dest: "/tmp/stack-arr/qbittorrent/kubernetes-files/files/docker-secrets.yaml" }
- { id: "iac.ansible.stackarr.qbittorrent.secret", dest: "/tmp/stack-arr/qbittorrent/kubernetes-files/files/vpn-secret.yaml" }
args:
executable: /bin/bash
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/qbittorrent/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o qbittorrent
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/qbittorrent/kubernetes-files/files/qbittorrent-namespace.yaml
kubectl apply -f /tmp/stack-arr/qbittorrent/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,75 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: radarr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: radarr
template:
metadata:
labels:
app: radarr
spec:
imagePullSecrets:
- name: regcred
containers:
- name: radarr
image: lscr.io/linuxserver/radarr:5.28.0
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 7878
name: webui
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
- name: RADARR__POSTGRES__HOST
value: 'stolon-proxy-service.postgresql.svc.cluster.local'
- name: RADARR__POSTGRES__USER
valueFrom:
secretKeyRef:
name: radarr-secret
key: username
- name: RADARR__POSTGRES__PASSWORD
valueFrom:
secretKeyRef:
name: radarr-secret
key: password
- name: RADARR__POSTGRES__MAINDB
valueFrom:
secretKeyRef:
name: radarr-secret
key: maindb
- name: RADARR__POSTGRES__LOGDB
valueFrom:
secretKeyRef:
name: radarr-secret
key: logsdb
volumeMounts:
- name: config
mountPath: /config
- name: downloads
mountPath: /downloads
- name: movie
mountPath: /movie
volumes:
- name: config
persistentVolumeClaim:
claimName: radarr-config-pvc
- name: downloads
persistentVolumeClaim:
claimName: qbittorrent-downloads-pvc
- name: movie
persistentVolumeClaim:
claimName: radarr-movie-pvc

View File

@ -0,0 +1,23 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: radarr-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/radarr
allowVolumeExpansion: true
reclaimPolicy: Retain
---
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: radarr-movie-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series/Filmes
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,60 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: radarr-config-pv
namespace: stack-arr
spec:
capacity:
storage: 2Gi
storageClassName: radarr-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/radarr/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: radarr-config-pvc
namespace: stack-arr
spec:
storageClassName: radarr-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: radarr-config-pv
resources:
requests:
storage: 2Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: radarr-movie-pv
namespace: stack-arr
spec:
capacity:
storage: 50Gi
storageClassName: radarr-movie-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series/Filmes
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: radarr-movie-pvc
namespace: stack-arr
spec:
storageClassName: radarr-movie-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: radarr-movie-pv
resources:
requests:
storage: 50Gi
---

View File

@ -0,0 +1,11 @@
apiVersion: v1
kind: Secret
metadata:
name: radarr-secret
namespace: stack-arr
type: Opaque
data:
username: dXNlcm5hbWU=
password: cGFzc3dvcmQ=
maindb: bWFpbmRiLXByb3dsYXJy
logsdb: bG9nZGItcHJvd2xhcnI=

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: radarr-service
namespace: stack-arr
spec:
ports:
- port: 7878
targetPort: 7878
selector:
app: radarr
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/radarr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/radarr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/radarr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/radarr/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Obter várias notas do Bitwarden
shell: |
echo "unlock"
BW_SESSION=$(bw unlock {{ bw_password }} --raw)
echo "get item"
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.stackarr.radarr.secret", dest: "/tmp/stack-arr/radarr/kubernetes-files/files/radarr-secret.yaml" }
args:
executable: /bin/bash
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/radarr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/radarr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,82 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: sonarr
namespace: stack-arr
spec:
replicas: 1
selector:
matchLabels:
app: sonarr
template:
metadata:
labels:
app: sonarr
spec:
imagePullSecrets:
- name: regcred
containers:
- name: sonarr
image: lscr.io/linuxserver/sonarr:4.0.16
securityContext:
capabilities:
add:
- NET_ADMIN
ports:
- containerPort: 8989
name: webui
env:
- name: PUID
value: "1013"
- name: PGID
value: "1013"
- name: TZ
value: 'Etc/UTC'
- name: SONARR__POSTGRES__HOST
value: 'stolon-proxy-service.postgresql.svc.cluster.local'
- name: SONARR__POSTGRES__USER
valueFrom:
secretKeyRef:
name: sonarr-secret
key: username
- name: SONARR__POSTGRES__PASSWORD
valueFrom:
secretKeyRef:
name: sonarr-secret
key: password
- name: SONARR__POSTGRES__MAINDB
valueFrom:
secretKeyRef:
name: sonarr-secret
key: maindb
- name: SONARR__POSTGRES__LOGDB
valueFrom:
secretKeyRef:
name: sonarr-secret
key: logsdb
volumeMounts:
- name: config
mountPath: /config
- name: downloads
mountPath: /downloads
- name: tv
mountPath: /tv
- name: anime
mountPath: /anime
volumes:
- name: config
persistentVolumeClaim:
claimName: sonarr-config-pvc
- name: downloads
persistentVolumeClaim:
claimName: qbittorrent-downloads-pvc
- name: tv
persistentVolumeClaim:
claimName: sonarr-tv-pvc
- name: anime
persistentVolumeClaim:
claimName: sonarr-anime-pvc

View File

@ -0,0 +1,35 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: sonarr-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/sonarr
allowVolumeExpansion: true
reclaimPolicy: Retain
---
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: sonarr-tv-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series/TV
allowVolumeExpansion: true
reclaimPolicy: Retain
---
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: sonarr-anime-nfs-csi
namespace: stack-arr
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series/Anime
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,90 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: sonarr-config-pv
namespace: stack-arr
spec:
capacity:
storage: 2Gi
storageClassName: sonarr-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/stack-arr/sonarr/config
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: sonarr-config-pvc
namespace: stack-arr
spec:
storageClassName: sonarr-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: sonarr-config-pv
resources:
requests:
storage: 2Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: sonarr-tv-pv
namespace: stack-arr
spec:
capacity:
storage: 50Gi
storageClassName: sonarr-tv-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series/TV
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: sonarr-tv-pvc
namespace: stack-arr
spec:
storageClassName: sonarr-tv-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: sonarr-tv-pv
resources:
requests:
storage: 50Gi
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: sonarr-anime-pv
namespace: stack-arr
spec:
capacity:
storage: 50Gi
storageClassName: sonarr-anime-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/Filmes_e_Series/Anime
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: sonarr-anime-pvc
namespace: stack-arr
spec:
storageClassName: sonarr-anime-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: sonarr-anime-pv
resources:
requests:
storage: 50Gi
---

View File

@ -0,0 +1,11 @@
apiVersion: v1
kind: Secret
metadata:
name: sonarr-secret
namespace: stack-arr
type: Opaque
data:
username: dXNlcm5hbWU=
password: cGFzc3dvcmQ=
maindb: bWFpbmRiLXByb3dsYXJy
logsdb: bG9nZGItcHJvd2xhcnI=

View File

@ -0,0 +1,12 @@
apiVersion: v1
kind: Service
metadata:
name: sonarr-service
namespace: stack-arr
spec:
ports:
- port: 8989
targetPort: 8989
selector:
app: sonarr
type: ClusterIP

View File

@ -0,0 +1,51 @@
- name: Remover o diretório /tmp/stack-arr/sonarr/kubernetes-files
ansible.builtin.file:
path: /tmp/stack-arr/sonarr/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stack-arr/sonarr/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stack-arr/sonarr/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Obter várias notas do Bitwarden
shell: |
echo "unlock"
BW_SESSION=$(bw unlock {{ bw_password }} --raw)
echo "get item"
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.stackarr.sonarr.secret", dest: "/tmp/stack-arr/sonarr/kubernetes-files/files/sonarr-secret.yaml" }
args:
executable: /bin/bash
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stack-arr/sonarr/kubernetes-files/files
register: resultado_ls
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stack-arr/sonarr/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,9 @@
apiVersion: v1
kind: Secret
metadata:
name: regcred
namespace: postgresql
data:
.dockerconfigjson: >-
eyJhdXRocyI6eyJodHRwczovL2luZGV4LmRvY2tlci5pby92MS8iOnsidXNlcm5hbWUiOiJ1c2VyIiwicGFzc3dvcmQiOiJwYXNzIiwiYXV0aCI6ImRmamlla2ZlcldFS1dFa29mY2RrbzM0MzUzZmQ9In19fQ==
type: kubernetes.io/dockerconfigjson

View File

@ -0,0 +1,126 @@
# PetSet was renamed to StatefulSet in k8s 1.5
# apiVersion: apps/v1alpha1
# kind: PetSet
apiVersion: apps/v1
kind: StatefulSet
metadata:
name: stolon-keeper
namespace: postgresql
spec:
serviceName: "stolon-keeper"
replicas: 3
selector:
matchLabels:
component: stolon-keeper
stolon-cluster: kube-stolon
template:
metadata:
labels:
component: stolon-keeper
stolon-cluster: kube-stolon
annotations:
pod.alpha.kubernetes.io/initialized: "true"
prometheus.io/scrape: "true"
prometheus.io/port: "8080"
spec:
imagePullSecrets:
- name: regcred
terminationGracePeriodSeconds: 10
containers:
- name: stolon-keeper
image: sorintlab/stolon:master-pg15
command:
- "/bin/bash"
- "-ec"
- |
echo "COMECANDO com user 1013"
useradd -u 1013 -r -s /usr/sbin/nologin fenixuser
id
id stolon
# Generate our keeper uid using the pod index
IFS='-' read -ra ADDR <<< "$(hostname)"
export STKEEPER_UID="keeper${ADDR[-1]}"
export POD_IP=$(hostname -i)
export STKEEPER_PG_LISTEN_ADDRESS=$POD_IP
which psql
which postgres
which pg_ctl
export STOLON_DATA=/stolon-data/data
mkdir -p $STOLON_DATA
ls -la $STOLON_DATA
exec gosu 1013 stolon-keeper --data-dir $STOLON_DATA
env:
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: STKEEPER_CLUSTER_NAME
valueFrom:
fieldRef:
fieldPath: metadata.labels['stolon-cluster']
- name: STKEEPER_STORE_BACKEND
value: "kubernetes"
- name: STKEEPER_KUBE_RESOURCE_KIND
value: "configmap"
- name: STKEEPER_PG_REPL_USERNAME
#value: "repluser"
valueFrom:
secretKeyRef:
name: stolon-repl-secret
key: username
- name: STKEEPER_PG_REPL_PASSWORD
#value: "replpassword"
valueFrom:
secretKeyRef:
name: stolon-repl-secret
key: password
- name: STKEEPER_PG_SU_USERNAME
#value: "stolon"
valueFrom:
secretKeyRef:
name: stolon-secret
key: username
- name: STKEEPER_PG_SU_PASSWORDFILE
value: "/etc/secrets/stolon/password"
- name: STKEEPER_METRICS_LISTEN_ADDRESS
value: "0.0.0.0:8080"
# Uncomment this to enable debug logs
#- name: STKEEPER_DEBUG
# value: "true"
ports:
- containerPort: 5432
- containerPort: 8080
volumeMounts:
- mountPath: /stolon-data
name: stolon-data
- mountPath: /etc/secrets/stolon
name: stolon
volumes:
- name: stolon
secret:
secretName: stolon-secret
volumeClaimTemplates:
- kind: PersistentVolumeClaim
apiVersion: v1
metadata:
name: stolon-data
namespace: postgresql
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 10Gi
selector:
matchLabels:
postgres-id: "stolon-0"

View File

@ -0,0 +1,4 @@
apiVersion: v1
kind: Namespace
metadata:
name: postgresql

View File

@ -0,0 +1,11 @@
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: stolon-nfs-csi
namespace: postgresql
provisioner: nfs.csi.k8s.io
parameters:
server: 192.168.1.22
share: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/postgresql-stolon
allowVolumeExpansion: true
reclaimPolicy: Retain

View File

@ -0,0 +1,14 @@
apiVersion: v1
kind: Service
metadata:
name: stolon-proxy-service
namespace: postgresql
spec:
ports:
- port: 5432
targetPort: 5432
selector:
component: stolon-proxy
stolon-cluster: kube-stolon
type: LoadBalancer
loadBalancerIP: 10.240.0.100

View File

@ -0,0 +1,58 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: stolon-proxy
namespace: postgresql
spec:
replicas: 3
selector:
matchLabels:
component: stolon-proxy
stolon-cluster: kube-stolon
template:
metadata:
labels:
component: stolon-proxy
stolon-cluster: kube-stolon
annotations:
prometheus.io/scrape: "true"
prometheus.io/port: "8080"
spec:
imagePullSecrets:
- name: regcred
containers:
- name: stolon-proxy
image: sorintlab/stolon:master-pg10
command:
- "/bin/bash"
- "-ec"
- |
exec gosu stolon stolon-proxy
env:
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: STPROXY_CLUSTER_NAME
valueFrom:
fieldRef:
fieldPath: metadata.labels['stolon-cluster']
- name: STPROXY_STORE_BACKEND
value: "kubernetes"
- name: STPROXY_KUBE_RESOURCE_KIND
value: "configmap"
- name: STPROXY_LISTEN_ADDRESS
value: "0.0.0.0"
- name: STPROXY_METRICS_LISTEN_ADDRESS
value: "0.0.0.0:8080"
## Uncomment this to enable debug logs
#- name: STPROXY_DEBUG
# value: "true"
ports:
- containerPort: 5432
- containerPort: 8080
readinessProbe:
tcpSocket:
port: 5432
initialDelaySeconds: 10
timeoutSeconds: 5

View File

@ -0,0 +1,111 @@
apiVersion: v1
kind: PersistentVolume
metadata:
name: stolon-pv-0
namespace: postgresql
labels:
postgres-id: "stolon-0"
spec:
capacity:
storage: 10Gi
storageClassName: stolon-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/postgresql-stolon/keeper-0
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: stolon-pv-1
namespace: postgresql
labels:
postgres-id: "stolon-0"
spec:
capacity:
storage: 10Gi
storageClassName: stolon-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/postgresql-stolon/keeper-1
---
apiVersion: v1
kind: PersistentVolume
metadata:
name: stolon-pv-2
namespace: postgresql
labels:
postgres-id: "stolon-0"
spec:
capacity:
storage: 10Gi
storageClassName: stolon-nfs-csi
accessModes:
- ReadWriteOnce
persistentVolumeReclaimPolicy: Retain
nfs:
server: 192.168.1.22
path: /mnt/fenix-main-nas-pool-0/data/k8s-Volumes/k8s-cluster-iac-deployed/postgresql-stolon/keeper-2
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: stolon-data-stolon-keeper-0
namespace: postgresql
labels:
postgres-id: "stolon-0"
spec:
storageClassName: stolon-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: stolon-pv-0
resources:
requests:
storage: 10Gi
selector:
matchLabels:
postgres-id: "stolon-0"
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: stolon-data-stolon-keeper-1
namespace: postgresql
labels:
postgres-id: "stolon-0"
spec:
storageClassName: stolon-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: stolon-pv-1
resources:
requests:
storage: 10Gi
selector:
matchLabels:
postgres-id: "stolon-0"
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: stolon-data-stolon-keeper-2
namespace: postgresql
labels:
postgres-id: "stolon-0"
spec:
storageClassName: stolon-nfs-csi
accessModes:
- ReadWriteOnce
volumeName: stolon-pv-2
resources:
requests:
storage: 10Gi
selector:
matchLabels:
postgres-id: "stolon-0"
---

View File

@ -0,0 +1,9 @@
apiVersion: v1
kind: Secret
metadata:
name: stolon-repl-secret
namespace: postgresql
type: Opaque
data:
username: asOndDQ5aWZqa2w0aW85
password: asOndDQ5aWZqa2w0aW85

View File

@ -0,0 +1,13 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: stolon-role-binding
namespace: postgresql
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: stolon-role
subjects:
- kind: ServiceAccount
name: default
namespace: postgresql

View File

@ -0,0 +1,14 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: stolon-role
namespace: postgresql
rules:
- apiGroups:
- ""
resources:
- pods
- configmaps
- events
verbs:
- "*"

View File

@ -0,0 +1,9 @@
apiVersion: v1
kind: Secret
metadata:
name: stolon-secret
namespace: postgresql
type: Opaque
data:
username: asOndDQ5aWZqa2w0aW85
password: asOndDQ5aWZqa2w0aW85

View File

@ -0,0 +1,50 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: stolon-sentinel
namespace: postgresql
spec:
replicas: 3
selector:
matchLabels:
component: stolon-sentinel
stolon-cluster: kube-stolon
template:
metadata:
labels:
component: stolon-sentinel
stolon-cluster: kube-stolon
annotations:
prometheus.io/scrape: "true"
prometheus.io/port: "8080"
spec:
imagePullSecrets:
- name: regcred
containers:
- name: stolon-sentinel
image: sorintlab/stolon:master-pg10
command:
- "/bin/bash"
- "-ec"
- |
exec gosu stolon stolon-sentinel
env:
- name: POD_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
- name: STSENTINEL_CLUSTER_NAME
valueFrom:
fieldRef:
fieldPath: metadata.labels['stolon-cluster']
- name: STSENTINEL_STORE_BACKEND
value: "kubernetes"
- name: STSENTINEL_KUBE_RESOURCE_KIND
value: "configmap"
- name: STSENTINEL_METRICS_LISTEN_ADDRESS
value: "0.0.0.0:8080"
## Uncomment this to enable debug logs
#- name: STSENTINEL_DEBUG
# value: "true"
ports:
- containerPort: 8080

View File

@ -0,0 +1,63 @@
- name: Remover o diretório /tmp/stolon/kubernetes-files
ansible.builtin.file:
path: /tmp/stolon/kubernetes-files
state: absent
- name: Criar diretório temporário no remoto
file:
path: /tmp/stolon/kubernetes-files
state: directory
mode: '0755'
- name: Copy file with owner and permissions
ansible.builtin.copy:
src: ../files
dest: /tmp/stolon/kubernetes-files
owner: fenix
group: root
mode: '0644'
- name: Listar conteúdo do diretório remoto
shell: ls -l /tmp/stolon/kubernetes-files/files
register: resultado_ls
- name: Obter várias notas do Bitwarden
shell: |
echo "unlock"
BW_SESSION=$(bw unlock {{ bw_password }} --raw)
echo "get item"
bw get item "{{ item.id }}" --session $BW_SESSION | jq -r '.notes' > {{ item.dest }}
loop:
- { id: "iac.ansible.dockersecrets", dest: "/tmp/stolon/kubernetes-files/files/docker-secrets.yaml" }
- { id: "iac.ansible.stolon.repl.secret", dest: "/tmp/stolon/kubernetes-files/files/stolon-repl-secret.yaml" }
- { id: "iac.ansible.stolon.keeper.secret", dest: "/tmp/stolon/kubernetes-files/files/stolon-secret.yaml" }
args:
executable: /bin/bash
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Mostrar resultado do ls
debug:
var: resultado_ls.stdout_lines
- name: Aplicar o stolon
become: yes
become_user: fenix
shell: |
kubectl apply -f /tmp/stolon/kubernetes-files/files/stolon-namespace.yaml
kubectl apply -f /tmp/stolon/kubernetes-files/files/
environment:
KUBECONFIG: /home/fenix/.kube/config
- name: reabilitar database stolon
become: yes
become_user: fenix
shell: |
kubectl run -i -n=postgresql -t stolonctl --image=sorintlab/stolon:master-pg15 --restart=Never --rm -- /usr/local/bin/stolonctl --cluster-name kube-stolon --store-backend kubernetes --kube-resource-kind=configmap init -y '{"initMode":"existing","existingConfig": {"keeperUID": "keeper0","followersUIDs": ["keeper1","keeper2"]}}'
# run this if first time setting up database
# kubectl run -i -n=postgresql -t stolonctl --image=sorintlab/stolon:master-pg15 --restart=Never --rm -- /usr/local/bin/stolonctl --cluster-name=kube-stolon --store-backend=kubernetes --kube-resource-kind=configmap init --yes
environment:
KUBECONFIG: /home/fenix/.kube/config

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"

View File

@ -0,0 +1,77 @@
- name: Atualizar pacotes e instalar dependências básicas
become: true
apt:
name:
- curl
- git
- unzip
- jq
- gnupg
- ca-certificates
state: present
update_cache: true
- name: Adicionar repositório NodeSource para Node.js 20
become: true
shell: curl -fsSL https://deb.nodesource.com/setup_20.x | bash -
args:
executable: /bin/bash
- name: Instalar Node.js 20
become: true
apt:
name: nodejs
state: present
update_cache: true
- name: Verificar versão do Node.js
command: node -v
register: node_version
changed_when: false
- name: Verificar versão do npm
command: npm -v
register: npm_version
changed_when: false
- name: Instalar Bitwarden CLI via npm
become: true
shell: npm install -g @bitwarden/cli
args:
executable: /bin/bash
- name: Verificar instalação do Bitwarden CLI
command: bw --version
register: bw_version
failed_when: bw_version.rc != 0
- name: Garantir logout do Bitwarden antes de configurar
shell: bw logout
ignore_errors: true
- name: Fazer login no Bitwarden
shell: |
echo "config"
echo "VAULTWARDEN_LINK: {{ VAULTWARDEN_LINK }}"
bw config server {{ VAULTWARDEN_LINK }}
echo $BW_CLIENTID
echo $BW_CLIENTSECRET
echo "login"
bw login --apikey
environment:
BW_CLIENTID: "{{ BW_CLIENTID }}"
BW_CLIENTSECRET: "{{ BW_CLIENTSECRET }}"
VAULTWARDEN_LINK: "{{ VAULTWARDEN_LINK }}"
args:
executable: /bin/bash
register: bw_login
- name: Desbloquear cofre e guardar sessão
shell: bw unlock {{ bw_password }} --raw
register: bw_session
environment:
BW_PASSWORD: "{{ BW_PASSWORD }}"
- name: Exportar sessão para ambiente local
shell: echo "export BW_SESSION={{ bw_session.stdout }}" >> /etc/profile.d/bw-session.sh
become: true

View File

@ -0,0 +1,4 @@
bw_password: "{{ lookup('env', 'BW_PASSWORD') }}"
VAULTWARDEN_LINK: "{{ lookup('env', 'VAULTWARDEN_LINK') }}"
BW_CLIENTID: "{{ lookup('env', 'BW_CLIENTID') }}"
BW_CLIENTSECRET : "{{ lookup('env', 'BW_CLIENTSECRET') }}"