151 Commits

Author SHA1 Message Date
Jack Jackson
e9145df641 Mount devices with Smarter Device Management 2025-01-21 22:32:33 -08:00
Jack Jackson
807785daca Mount video card into Jellyfin container
To permit Hardware Acceleration.

See [here](https://stackoverflow.com/a/59291859),
[here](https://jellyfin.org/docs/general/administration/hardware-acceleration/),
and
[here](https://old.reddit.com/r/jellyfin/comments/i2r4h9/how_to_enable_hardware_acceleration_with_docker/).
2025-01-21 21:59:34 -08:00
Jack Jackson
60417775be Update EDH ELO commit to "c6a279a703" 2024-11-19 04:01:29 +00:00
Jack Jackson
1b617368b8 Introduce Miniflux 2024-11-13 20:39:46 -08:00
Jack Jackson
b5eee54ac3 Remove unused config PVC 2024-11-01 12:02:07 -07:00
Jack Jackson
46d6ee105f Remove hardcoded nodename that was overriding nodeSelector set in previous commit 2024-11-01 11:54:47 -07:00
Jack Jackson
42e40bf23e NodeSelect to Epsilon while rasnu1 is misbehaving 2024-10-29 16:39:01 -07:00
Jack Jackson
73accc5b7b Update EDH ELO commit to "8b5d96e76f" 2024-09-05 05:01:48 +00:00
Jack Jackson
ab2d7a3c30 Update EDH ELO commit to "5d2183bbf0" 2024-08-23 17:02:11 +00:00
Jack Jackson
78302757cd Update EDH ELO commit to "f120336f1d" 2024-08-23 16:39:22 +00:00
Jack Jackson
f5cbefc00e Enable Readarr 2024-08-21 20:02:17 -07:00
Jack Jackson
843252d917 Update EDH ELO commit to "460467bd0b" 2024-08-08 05:45:05 +00:00
Jack Jackson
0244e53970 Update EDH ELO commit to "bf7997bd1d" 2024-08-08 05:29:24 +00:00
Jack Jackson
144c55c2b1 Update EDH ELO commit to "fff79bf883" 2024-08-08 04:19:54 +00:00
Jack Jackson
489ad4b726 Update EDH ELO commit to "c874de3a4c" 2024-08-08 04:18:18 +00:00
Jack Jackson
34e6f91ba0 Update EDH ELO commit to "b01831b5ac" 2024-08-08 04:16:28 +00:00
Jack Jackson
a64a420e94 Update EDH ELO commit to "2ba4cf9a30" 2024-08-01 03:56:14 +00:00
Jack Jackson
facac2a99f Update EDH ELO commit to "5d71f422f3" 2024-08-01 03:53:38 +00:00
Jack Jackson
2fd086fa34 Update EDH ELO commit to "fff4fa6c57" 2024-07-30 17:02:54 +00:00
Jack Jackson
0671898319 Update EDH ELO commit to "3b1c3d7eb3" 2024-07-30 03:18:56 +00:00
Jack Jackson
492bf8e10d Update EDH ELO commit to "105dc438bd" 2024-07-29 02:21:31 +00:00
Jack Jackson
f71cbf8c50 Update EDH ELO commit to "0e69452403" 2024-07-28 04:28:57 +00:00
Jack Jackson
8ee06464a7 Update EDH ELO commit to "2fb5a291e5" 2024-07-28 03:09:50 +00:00
Jack Jackson
cb8d11ec1a Revert "Revert "Update to latest version of Sonarr""
This reverts commit d204131de34c2d03a2b2e207e4b779548464336f.
2024-07-15 22:35:48 -07:00
Jack Jackson
d204131de3 Revert "Update to latest version of Sonarr"
This reverts commit 378046ac62767d3ec7f1d2411c65c4ce6f189ff5.
2024-07-15 22:09:17 -07:00
Jack Jackson
378046ac62 Update to latest version of Sonarr 2024-07-15 21:34:46 -07:00
Jack Jackson
6004858c85 Update EDH ELO commit to "1c9aa30721" 2024-07-11 04:23:47 +00:00
Jack Jackson
19089def9b Update EDH ELO commit to "a4b17daca0" 2024-07-11 04:02:45 +00:00
Jack Jackson
1ae48be3ea Testing credentials 2024-07-09 01:01:09 -07:00
Jack Jackson
46c20001ca Standardize on existing secret for postgres auth 2024-07-01 21:37:02 -07:00
Jack Jackson
322db77194 Update EDH ELO tag 2024-07-01 20:59:54 -07:00
Jack Jackson
7e6c394929 Update edh-elo commit 2024-06-27 10:45:48 -07:00
Jack Jackson
be10ebe8a4 Update edh-elo commit 2024-06-27 10:15:48 -07:00
Jack Jackson
93dd5c424f Update edh-elo commit 2024-06-27 10:14:46 -07:00
Jack Jackson
e879b0ba05 Use legal database-user name 2024-06-27 09:43:05 -07:00
Jack Jackson
89511e3747 Update edh-elo commit 2024-06-27 09:35:34 -07:00
Jack Jackson
864b8189e3 Update git commit 2024-06-26 19:17:25 -07:00
Jack Jackson
2ff2c4224c Deploy edh-elo 2024-06-24 21:11:16 -07:00
Jack Jackson
8d70bbe78b Enable Drone Kubernetes Secrets Chart
Interestingly, the existence of this chart somewhat contradicts the
[docs](https://docs.drone.io/runner/extensions/kube/), which suggest you
should "_\[d\]eploy the secret extension in the same Pod as your
Kubernetes runner_". Though the interaction appears to be via an HTTP
call, so that doesn't seem like would be an issue.
2024-06-05 15:05:53 -07:00
Jack Jackson
4cc1c531e2 Provide a k8s secret containing Mastodon Access Token
To auto-post on publishing a new blog post.
2024-06-04 17:03:09 -07:00
Jack Jackson
2d1fd9ef0c Specify MaxTTL for Tokens from BaseAppInfra
I encoutered an issue where tokens were being created without TTLs and
thus clogging up the storage of the system. I haven't found a smoking
gun pointing to this being the cause, but I do suspect that it's
_something_ to do with the Vault/Crossplane integration, since a) that's
really my only use-case for Vault, and b) there's the string
`vault-provider` in the display_name below:

```
$ vault token lookup -accessor zcRF0YAUQtP7vrbZHTW5y322
Key                 Value
---                 -----
accessor            zcRF0YAUQtP7vrbZHTW5y322
creation_time       1715766311
creation_ttl        0s
display_name        token-vault-provider-token
entity_id           n/a
expire_time         <nil>
explicit_max_ttl    0s
id                  n/a
issue_time          2024-05-15T09:45:11.720412011Z
meta                <nil>
num_uses            0
orphan              false
path                auth/token/create
policies            [root]
renewable           false
ttl                 0s
type                service
```
2024-06-04 15:43:42 -07:00
Jack Jackson
496c2f13b0 Expand (and explicitly specify storageclass of) Vault storage
Due to currently-unknown fault, my Vault storage got full up (I
_suspect_ it's due to not setting a default TTL on Tokens, and so they
all hung around. Surprised they were created at such a rate, but w/e). I
wasn't able to directly expand the volume - and, anyway, it's on
Longhorn which is a Storage Provisioner that I'm moving away from - so
the solution was to:
* Create a temporary PV (on FreeNas, though that doesn't actually
  matter) and copy data onto it (by mounting both it and the existing
  Volume onto a debug pod, using a variant of [this
  script](https://blog.scubbo.org/posts/pvc-debug-pod/))
* Delete the existing PVC and PV
* Make this update, and sync
  * A new _empty_ PV will be created (and probably populated with some
    stuff)
* Scale-down the StatefulSet, do the double-mount-to-debug-pod trick
  again, and copy data from the temporary PV onto this one
* Delete Debug Pod, re-scale-up StatefulSet...and hope that there's
  nothing stateful in the data which means that copying it from one
  volume to another makes it invalid (e.g. if encrypted with an
  encryption key which would change on a new spin-up of the pod - which
  _seems_ unlikely, but 🤷)
2024-06-04 14:07:45 -07:00
Jack Jackson
e798564692 First steps in Crossplane-Vault integration 2024-05-08 23:45:39 -07:00
Jack Jackson
bcb2bd28d7 Enable sabnzbd 2024-05-08 07:35:36 -07:00
Jack Jackson
4c82c014f8 Add vault-sourced secret in Drone setup 2024-04-21 14:02:43 -07:00
Jack Jackson
1926560274 Jsonnify Drone 2024-04-21 13:08:41 -07:00
Jack Jackson
b856fd2bc5 Set up Vault Secrets Operator
Prerequisite that Vault is configured with authentication per
https://developer.hashicorp.com/vault/tutorials/kubernetes/vault-secrets-operator#configure-vault

The plan would eventually be to manage Vault objects via
[Crossplane](https://www.crossplane.io/).
2024-04-21 12:46:01 -07:00
Jack Jackson
3140ea8b0d Correctly represent env variable 2024-04-20 13:45:13 -07:00
Jack Jackson
185af7901a Remove initContainer backup approach 2024-04-20 13:21:41 -07:00
Jack Jackson
b4c9947e4c Try including date in backup name 2024-04-19 21:32:13 -07:00