178 Commits

Author SHA1 Message Date
Jack Jackson
cb8d11ec1a Revert "Revert "Update to latest version of Sonarr""
This reverts commit d204131de34c2d03a2b2e207e4b779548464336f.
2024-07-15 22:35:48 -07:00
Jack Jackson
d204131de3 Revert "Update to latest version of Sonarr"
This reverts commit 378046ac62767d3ec7f1d2411c65c4ce6f189ff5.
2024-07-15 22:09:17 -07:00
Jack Jackson
378046ac62 Update to latest version of Sonarr 2024-07-15 21:34:46 -07:00
Jack Jackson
6004858c85 Update EDH ELO commit to "1c9aa30721" 2024-07-11 04:23:47 +00:00
Jack Jackson
19089def9b Update EDH ELO commit to "a4b17daca0" 2024-07-11 04:02:45 +00:00
Jack Jackson
1ae48be3ea Testing credentials 2024-07-09 01:01:09 -07:00
Jack Jackson
46c20001ca Standardize on existing secret for postgres auth 2024-07-01 21:37:02 -07:00
Jack Jackson
322db77194 Update EDH ELO tag 2024-07-01 20:59:54 -07:00
Jack Jackson
7e6c394929 Update edh-elo commit 2024-06-27 10:45:48 -07:00
Jack Jackson
be10ebe8a4 Update edh-elo commit 2024-06-27 10:15:48 -07:00
Jack Jackson
93dd5c424f Update edh-elo commit 2024-06-27 10:14:46 -07:00
Jack Jackson
e879b0ba05 Use legal database-user name 2024-06-27 09:43:05 -07:00
Jack Jackson
89511e3747 Update edh-elo commit 2024-06-27 09:35:34 -07:00
Jack Jackson
864b8189e3 Update git commit 2024-06-26 19:17:25 -07:00
Jack Jackson
2ff2c4224c Deploy edh-elo 2024-06-24 21:11:16 -07:00
Jack Jackson
8d70bbe78b Enable Drone Kubernetes Secrets Chart
Interestingly, the existence of this chart somewhat contradicts the
[docs](https://docs.drone.io/runner/extensions/kube/), which suggest you
should "_\[d\]eploy the secret extension in the same Pod as your
Kubernetes runner_". Though the interaction appears to be via an HTTP
call, so that doesn't seem like would be an issue.
2024-06-05 15:05:53 -07:00
Jack Jackson
4cc1c531e2 Provide a k8s secret containing Mastodon Access Token
To auto-post on publishing a new blog post.
2024-06-04 17:03:09 -07:00
Jack Jackson
2d1fd9ef0c Specify MaxTTL for Tokens from BaseAppInfra
I encoutered an issue where tokens were being created without TTLs and
thus clogging up the storage of the system. I haven't found a smoking
gun pointing to this being the cause, but I do suspect that it's
_something_ to do with the Vault/Crossplane integration, since a) that's
really my only use-case for Vault, and b) there's the string
`vault-provider` in the display_name below:

```
$ vault token lookup -accessor zcRF0YAUQtP7vrbZHTW5y322
Key                 Value
---                 -----
accessor            zcRF0YAUQtP7vrbZHTW5y322
creation_time       1715766311
creation_ttl        0s
display_name        token-vault-provider-token
entity_id           n/a
expire_time         <nil>
explicit_max_ttl    0s
id                  n/a
issue_time          2024-05-15T09:45:11.720412011Z
meta                <nil>
num_uses            0
orphan              false
path                auth/token/create
policies            [root]
renewable           false
ttl                 0s
type                service
```
2024-06-04 15:43:42 -07:00
Jack Jackson
496c2f13b0 Expand (and explicitly specify storageclass of) Vault storage
Due to currently-unknown fault, my Vault storage got full up (I
_suspect_ it's due to not setting a default TTL on Tokens, and so they
all hung around. Surprised they were created at such a rate, but w/e). I
wasn't able to directly expand the volume - and, anyway, it's on
Longhorn which is a Storage Provisioner that I'm moving away from - so
the solution was to:
* Create a temporary PV (on FreeNas, though that doesn't actually
  matter) and copy data onto it (by mounting both it and the existing
  Volume onto a debug pod, using a variant of [this
  script](https://blog.scubbo.org/posts/pvc-debug-pod/))
* Delete the existing PVC and PV
* Make this update, and sync
  * A new _empty_ PV will be created (and probably populated with some
    stuff)
* Scale-down the StatefulSet, do the double-mount-to-debug-pod trick
  again, and copy data from the temporary PV onto this one
* Delete Debug Pod, re-scale-up StatefulSet...and hope that there's
  nothing stateful in the data which means that copying it from one
  volume to another makes it invalid (e.g. if encrypted with an
  encryption key which would change on a new spin-up of the pod - which
  _seems_ unlikely, but 🤷)
2024-06-04 14:07:45 -07:00
Jack Jackson
e798564692 First steps in Crossplane-Vault integration 2024-05-08 23:45:39 -07:00
Jack Jackson
bcb2bd28d7 Enable sabnzbd 2024-05-08 07:35:36 -07:00
Jack Jackson
4c82c014f8 Add vault-sourced secret in Drone setup 2024-04-21 14:02:43 -07:00
Jack Jackson
1926560274 Jsonnify Drone 2024-04-21 13:08:41 -07:00
Jack Jackson
b856fd2bc5 Set up Vault Secrets Operator
Prerequisite that Vault is configured with authentication per
https://developer.hashicorp.com/vault/tutorials/kubernetes/vault-secrets-operator#configure-vault

The plan would eventually be to manage Vault objects via
[Crossplane](https://www.crossplane.io/).
2024-04-21 12:46:01 -07:00
Jack Jackson
3140ea8b0d Correctly represent env variable 2024-04-20 13:45:13 -07:00
Jack Jackson
185af7901a Remove initContainer backup approach 2024-04-20 13:21:41 -07:00
Jack Jackson
b4c9947e4c Try including date in backup name 2024-04-19 21:32:13 -07:00
Jack Jackson
6d338157fa Put Keycloak backup volumes in right namespace 2024-04-19 21:01:26 -07:00
Jack Jackson
abc71fd7f1 Set securityContext to permit truenas file operations 2024-04-10 17:49:16 -07:00
Jack Jackson
40427c0426 Add Keycloak Backup job 2024-04-06 17:33:07 -07:00
Jack Jackson
a98d915658 Add backup as crontab 2024-04-06 14:53:42 -07:00
Jack Jackson
68f83a23b3 Install keycloak 2024-04-06 13:20:14 -07:00
Jack Jackson
de944bac48 Remove Grafana Oncall 2024-03-12 19:10:13 -07:00
Jack Jackson
b107f1e839 Dehelmify, and install Crossplane via Jsonnet
Need to remove `Chart.yaml` so that Argo doesn't try to treat
`app-of-apps/` as a Helm application (because that would stop it from
using Jsonnet parsing).
2024-03-12 18:49:06 -07:00
Jack Jackson
d1e000dc10 Avoid Drone-runner on the cursed node 2024-02-19 13:42:35 -08:00
Jack Jackson
7c3364fef9 Addressing Sonarr DB Migration error 2024-02-17 18:44:14 -08:00
Jack Jackson
3dfc818f5f First attempt at installing OpenProject 2024-01-14 20:00:56 -08:00
Jack Jackson
a3b154adf8 Mount Truenas directly at /data 2023-12-08 21:45:58 -08:00
Jack Jackson
5548684b7a Create admin Drone user 2023-12-01 22:56:40 -08:00
Jack Jackson
657942071a Fully migrate to TrueNas for Nzbget 2023-11-28 19:17:16 -08:00
Jack Jackson
feee5d6979 Add Blog application 2023-11-24 14:28:36 -08:00
Jack Jackson
ab1bc63f84 Re-enable Vault
Note that I was wrong before - there was no need to disable while
setting up TrueNAS, because Vault suggests using integrated storage.
2023-10-30 22:13:46 -07:00
Jack Jackson
7eb215f7fa Remove Longhorn Media volumes now fully migrated 2023-10-04 10:00:57 -07:00
Jack Jackson
69b15c1ad6 Temporarily mount TrueNAS to Jellyfin as Read-Write to transfer data from Longhorn volumes 2023-10-01 19:40:59 -07:00
Jack Jackson
a3e807c406 Mount TrueNAS volume for Usenet Downloads 2023-09-30 16:53:15 -07:00
Jack Jackson
499d3acaf5 Mount TrueNas volume on all appropriate containers 2023-09-30 14:50:15 -07:00
Jack Jackson
b183c2bf6b Reintroduce TrueNAS storage after reconfiguration 2023-09-23 20:13:43 -07:00
Jack Jackson
58bc49412e Remove TrueNAS volume from Jellyfin while reconfiguring 2023-09-23 19:27:59 -07:00
Jack Jackson
0bc8d9b219 Temporarily delete Vault app while I reconfigure TrueNAS 2023-09-23 19:13:59 -07:00
Jack Jackson
7373ba6346 Introduce TrueNas volume for Jellyfin 2023-09-22 22:39:43 -07:00